CN111966996A - Data processing method and device - Google Patents
Data processing method and device Download PDFInfo
- Publication number
- CN111966996A CN111966996A CN201910418985.2A CN201910418985A CN111966996A CN 111966996 A CN111966996 A CN 111966996A CN 201910418985 A CN201910418985 A CN 201910418985A CN 111966996 A CN111966996 A CN 111966996A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- authority
- information
- processed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract description 20
- 238000000034 method Methods 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 11
- 230000001960 triggered effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 description 11
- 230000009471 action Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a data processing method, which comprises the following steps: firstly, an operation instruction of a user for first data can be received, wherein the operation instruction carries user identification information of the user, then, permission information of the user is determined according to the user identification information, further, data to be processed is determined from the first data based on the permission information, and the data to be processed is processed according to the operation instruction. In the scheme, the authority information of the user can be determined according to the user identification information of the user, and then the to-be-processed data which can be processed by the user is determined from the first data through the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
Description
Technical Field
The present invention relates to the field of computer application technologies, and in particular, to a data processing method and apparatus.
Background
In some scenarios, data stored in the device has certain confidentiality, and if any user can process the data, the data may be leaked.
In the related art, data leakage is generally prevented by granting operation authority only to a specific user. If a user is not granted the operation right, the user cannot process any data stored in the device. If a user is granted the operation right, the user can process all data in the device.
However, in the above method, the user granted the operation authority has the authority to process all the data, that is, the user granted the operation authority does not limit the processing of the data, and the security of the data is not high enough.
Disclosure of Invention
An embodiment of the present invention provides a data processing method and apparatus, so as to improve data security. The specific technical scheme is as follows:
the embodiment of the invention provides a data processing method, which comprises the following steps:
receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
determining the authority information of the user according to the user identification information;
determining data to be processed from the first data based on the authority information;
and processing the data to be processed according to the operation instruction.
Optionally, before the receiving an operation instruction of the user for the first data, the method further includes:
acquiring a user name and a user password input by a user;
judging whether the user name is matched with the user password;
and if the first data is matched with the second data, judging that the user authentication is successful, and executing the step of receiving the operation instruction of the user for the first data.
Optionally, in a case that it is determined that the user name matches the user password, the method further includes:
judging whether the user is a high-authority user or not according to the user name and the user password;
if so, receiving authority configuration information input by the high-authority user, determining authority information of other users except the high-authority user according to the authority configuration information, and establishing a corresponding relation between user identification information and the authority information;
determining the authority information of the user according to the user identification information comprises the following steps:
and inquiring the authority information of the user from the established corresponding relation between the user identification information and the authority information according to the user identification information.
Optionally, the permission information is a permission open time period; the determining the data to be processed from the first data based on the authority information comprises:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
Optionally, the operation instruction is a data downloading instruction; the processing the data to be processed according to the operation instruction comprises:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
An embodiment of the present invention further provides a data processing apparatus, where the apparatus includes:
the receiving module is used for receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
the determining module is used for determining the authority information of the user according to the user identification information;
the selection module is used for determining data to be processed from the first data based on the authority information;
and the processing module is used for processing the data to be processed according to the operation instruction.
Optionally, the apparatus further comprises:
the authentication module is used for acquiring a user name and a user password input by a user; judging whether the user name is matched with the user password; if the user authentication is matched with the user authentication, the user authentication is judged to be successful, and the receiving module is triggered.
Optionally, the apparatus further comprises:
the judging module is used for judging whether the user is a high-authority user or not according to the user name and the user password; if yes, triggering a configuration module;
the configuration module is used for receiving the authority configuration information input by the high-authority user, determining the authority information of other users except the high-authority user according to the authority configuration information, and establishing the corresponding relation between the user identification information and the authority information;
the determining module is specifically configured to query the authority information of the user from the established correspondence between the user identification information and the authority information according to the user identification information.
Optionally, the permission information is a permission open time period; the selection module is specifically configured to:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
Optionally, the operation instruction is a data downloading instruction; the processing module is specifically configured to:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
The embodiment of the invention also provides electronic equipment which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
and a processor for implementing any of the above-described data processing method steps when executing the program stored in the memory.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements any of the steps of the data processing method described above.
According to the data processing method and device provided by the embodiment of the invention, firstly, an operation instruction of a user for first data can be received, wherein the operation instruction carries user identification information of the user, then, permission information of the user is determined according to the user identification information, further, data to be processed is determined from the first data based on the permission information, and the data to be processed is processed according to the operation instruction. In the scheme, the authority information of the user can be determined according to the user identification information of the user, and then the to-be-processed data which can be processed by the user is determined from the first data through the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
Of course, not all of the advantages described above need to be achieved at the same time in the practice of any one product or method of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data processing method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the related art, data leakage is generally prevented by granting operation authority only to a specific user. If a user is not granted the operation right, the user cannot process any data stored in the device. If a user is granted the operation right, the user can process all data in the device. However, this results in that the user granted the operation right does not limit the processing of the data and the security of the data is not high enough.
Therefore, in order to solve the above technical problem, an embodiment of the present invention provides a data processing method, which may be applied to electronic devices such as a network camera, a hard disk video recorder, a computer, a server, and a mobile terminal, and is not limited specifically.
The following generally describes a data processing method provided by an embodiment of the present invention.
In one implementation, the data processing method includes:
receiving an operation instruction of a user for the first data, wherein the operation instruction carries user identification information of the user;
determining authority information of the user according to the user identification information;
determining data to be processed from the first data based on the authority information;
and processing the data to be processed according to the operation instruction.
As can be seen from the above, according to the data processing method provided by the embodiment of the present invention, the authority information of the user can be determined according to the user identification information of the user, and then the to-be-processed data that can be processed by the user is determined from the first data according to the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
The data processing method provided by the embodiment of the present invention will be described in detail by specific embodiments.
As shown in fig. 1, a schematic flow chart of a data processing method provided in an embodiment of the present invention includes the following steps:
s101: and receiving an operation instruction of a user for the first data, wherein the operation instruction carries user identification information of the user.
In this step, the operation instruction refers to an operation instruction of the user on the first data, and may be any one or more operations of reading, modifying, downloading, and the like on the first data. For example, if the first data is video data, the operation instruction may be operations such as playback and export of the video data.
The user identification information of the user may be a record name or a user password used by the user, or may be a specific identification code of the user, which is not limited specifically.
In one implementation, before receiving an operation instruction of a user for first data, the identity of the user may be authenticated, and only a user who succeeds in authentication can send the operation instruction, but a user who fails in authentication cannot send the operation instruction.
For example, the identity of the user may be authenticated by performing biometric recognition on the user, such as face recognition, fingerprint recognition, and the like on the user. Alternatively, the user login device may be identified, and for example, the user may be authenticated by identifying an IP address or device information of the user login device.
In addition, in one implementation, the identity of the user may also be authenticated through information input by the user. For example, the authentication information may be a user name and a user password corresponding to the user name, and then, when performing user authentication, it may be determined whether the user name and the user password are matched according to the user name and the user password input by the user, and if so, it may be determined that the user authentication is successful.
S102: and determining the authority information of the user according to the user identification information.
The permission information of the user may be a permission open time period, that is, the user only has a processing permission for the data acquired in the permission open time period. Alternatively, the authority information of the user may be an authority open area, that is, the user only has a processing authority for the data collected in the authority open area. Alternatively, the permission information may be a device number of the permission-opened device, that is, the user only has a processing permission for the data acquired by the acquisition device corresponding to one or more specific device numbers. In other words, the range of data that can be processed by a user can be limited by the authority information of the user.
It will be appreciated that different rights information may generally be configured for different users. For example, when the authority information is the authority open time period, the authority open time period of the user 1 may be configured to be 8 o 'clock on weekday, tuesday, thursday night to 8 o' clock on the second morning, the authority open time period of the user 2 may be configured to be 8 o 'clock on monday, wednesday, friday night to 8 o' clock on the second morning, the authority open time period of the user 3 may be configured to be 8 o 'clock on morning to 8 o' clock on morning of monday to friday, and the authority open time period of the user 4 may be configured to be 8 o 'clock on saturday morning to 8 o' clock on weekday night, and so on.
The authority information of the user may be configured in advance, for example, corresponding authority information may be configured for the user when the user registers, so that each user has corresponding fixed authority information.
Alternatively, in one implementation, the authority information of the user may be configured for other users by the high-authority user. For example, after the user name and the user password input by the user are obtained, if it is determined that the user name and the user password are matched, it may be determined whether the user is a high-authority user according to the user name and the user password. If so, receiving the authority configuration information input by the high-authority user, determining the authority information of other users except the high-authority user according to the authority configuration information, and establishing the corresponding relation between the user identification information and the authority information.
In this way, the authority information of each user can be configured by the high-authority user, so that the authority information of each user can be modified conveniently.
S103: and determining the data to be processed from the first data based on the authority information.
It can be understood that the authority information may limit certain attribute information of the first data, so that the first data may be screened based on the authority information, and the data to be processed may be determined therefrom.
For example, if the permission information is a permission open time period, first, a coincidence time period between the permission open time period and the collection time period of the first data may be determined, and then, data collected in the coincidence time period may be selected from the first data as data to be processed.
Or, if the authority information is the authority open area, first, a coincidence collection location in the authority open area may be determined according to a collection location of the first data, and then, data collected at the coincidence collection location is selected from the first data as data to be processed.
Or, if the authority information is the device number of the authority opening device, the data collected by the authority opening device may be determined from the first data as the data to be processed according to the device number of the authority opening device.
S104: and processing the data to be processed according to the operation instruction.
In one implementation, if the operation instruction is a data download instruction, first, encryption information corresponding to a user may be determined according to user identification information, data to be processed is encrypted according to the encryption information, and then the encrypted data to be processed is downloaded. Therefore, the downloaded data is encrypted data, and can be further processed only by acquiring decryption information corresponding to the encrypted information, so that the safety of the data is improved.
The encrypted information may be a user name or a user password of the user, or a password agreed in advance, and is not limited specifically.
For example, when the operation instruction is a data search instruction and the permission information is a permission open time period, if the permission open time period of the user 1 is from 8 o 'clock on sunday, tuesday, and thursday night to 8 o' clock on the next morning, the user 1 can only search the data collected in the permission open time period, and the data collected in other time periods are not displayed in the search result of the user 1.
As can be seen from the above, according to the data processing method provided by the embodiment of the present invention, the authority information of the user can be determined according to the user identification information of the user, and then the to-be-processed data that can be processed by the user is determined from the first data according to the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
As shown in fig. 2, an embodiment of the present invention further provides a data processing apparatus, where the apparatus includes:
a receiving module 201, configured to receive an operation instruction of a user for first data, where the operation instruction carries user identification information of the user;
a determining module 202, configured to determine, according to the user identification information, authority information of the user;
the selection module 203 is used for determining data to be processed from the first data based on the authority information;
the processing module 204 is configured to process the data to be processed according to the operation instruction.
In one implementation, the apparatus further comprises:
an authentication module 205, configured to obtain a user name and a user password input by a user; judging whether the user name is matched with the user password; if the user authentication is successful, the receiving module 201 is triggered.
In one implementation, the apparatus further comprises:
a judging module (not shown in the figure) for judging whether the user is a high-authority user according to the user name and the user password; if yes, triggering a configuration module (not shown in the figure);
a configuration module (not shown in the figure) for receiving the authority configuration information input by the high-authority user, determining the authority information of other users except the high-authority user according to the authority configuration information, and establishing a corresponding relationship between the user identification information and the authority information;
the determining module 202 is specifically configured to query the authority information of the user from the established corresponding relationship between the user identification information and the authority information according to the user identification information.
In one implementation, the permission information is a permission open time period; the selecting module 203 is specifically configured to:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
In one implementation, the operation instruction is a data download instruction; the processing module 204 is specifically configured to:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
As can be seen from the above, the data processing apparatus provided in the embodiment of the present invention can determine the authority information of the user according to the user identification information of the user, and further determine the to-be-processed data that can be processed by the user from the first data through the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
The embodiment of the present invention further provides an electronic device, as shown in fig. 3, which includes a processor 301, a communication interface 302, a memory 303, and a communication bus 304, where the processor 301, the communication interface 302, and the memory 303 complete mutual communication through the communication bus 304,
a memory 303 for storing a computer program;
the processor 301, when executing the program stored in the memory 303, implements the following steps:
receiving an operation instruction of a user for the first data, wherein the operation instruction carries user identification information of the user;
determining authority information of the user according to the user identification information;
determining data to be processed from the first data based on the authority information;
and processing the data to be processed according to the operation instruction.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
As can be seen from the above, according to the data processing method provided by the embodiment of the present invention, the authority information of the user can be determined according to the user identification information of the user, and then the to-be-processed data that can be processed by the user is determined from the first data according to the authority information. It can be understood that different users can correspond to different authority information, so that even if a user has authority, the data which can be processed by the user is limited by the authority information, and the processing of all data is difficult to realize, thereby improving the security of the data.
In yet another embodiment of the present invention, a computer-readable storage medium is further provided, which has instructions stored therein, and when the instructions are executed on a computer, the computer is caused to execute the data processing method described in any one of the above embodiments.
In a further embodiment of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the data processing method of any of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus embodiment, the electronic device embodiment and the storage medium embodiment, since they are substantially similar to the method embodiment, the description is relatively simple, and in relation to the description, reference may be made to some portions of the description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (12)
1. A method of data processing, the method comprising:
receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
determining the authority information of the user according to the user identification information;
determining data to be processed from the first data based on the authority information;
and processing the data to be processed according to the operation instruction.
2. The method of claim 1, wherein prior to the receiving the user operation instruction for the first data, the method further comprises:
acquiring a user name and a user password input by a user;
judging whether the user name is matched with the user password;
and if the first data is matched with the second data, judging that the user authentication is successful, and executing the step of receiving the operation instruction of the user for the first data.
3. The method of claim 2, wherein in the event that the username is determined to match the user password, the method further comprises:
judging whether the user is a high-authority user or not according to the user name and the user password;
if so, receiving authority configuration information input by the high-authority user, determining authority information of other users except the high-authority user according to the authority configuration information, and establishing a corresponding relation between user identification information and the authority information;
determining the authority information of the user according to the user identification information comprises the following steps:
and inquiring the authority information of the user from the established corresponding relation between the user identification information and the authority information according to the user identification information.
4. The method according to claim 1, wherein the right information is a right open period; the determining the data to be processed from the first data based on the authority information comprises:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
5. The method of claim 1, wherein the operation instruction is a data download instruction; the processing the data to be processed according to the operation instruction comprises:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
6. A data processing apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving an operation instruction of a user for first data, wherein the operation instruction carries user identification information of the user;
the determining module is used for determining the authority information of the user according to the user identification information;
the selection module is used for determining data to be processed from the first data based on the authority information;
and the processing module is used for processing the data to be processed according to the operation instruction.
7. The apparatus of claim 6, further comprising:
the authentication module is used for acquiring a user name and a user password input by a user; judging whether the user name is matched with the user password; if the user authentication is matched with the user authentication, the user authentication is judged to be successful, and the receiving module is triggered.
8. The apparatus of claim 7, further comprising:
the judging module is used for judging whether the user is a high-authority user or not according to the user name and the user password; if yes, triggering a configuration module;
the configuration module is used for receiving the authority configuration information input by the high-authority user, determining the authority information of other users except the high-authority user according to the authority configuration information, and establishing the corresponding relation between the user identification information and the authority information;
the determining module is specifically configured to query the authority information of the user from the established correspondence between the user identification information and the authority information according to the user identification information.
9. The apparatus of claim 6, wherein the permission information is a permission open period; the selection module is specifically configured to:
determining a coincidence time period between the permission opening time period and the acquisition time period of the first data;
and selecting the data collected in the coincidence time period from the first data as the data to be processed.
10. The apparatus of claim 6, wherein the operation instruction is a data download instruction; the processing module is specifically configured to:
according to the user identification information, determining encryption information corresponding to the user;
and encrypting the data to be processed according to the encryption information, and downloading the encrypted data to be processed.
11. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
12. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910418985.2A CN111966996A (en) | 2019-05-20 | 2019-05-20 | Data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910418985.2A CN111966996A (en) | 2019-05-20 | 2019-05-20 | Data processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111966996A true CN111966996A (en) | 2020-11-20 |
Family
ID=73358202
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910418985.2A Pending CN111966996A (en) | 2019-05-20 | 2019-05-20 | Data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111966996A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113286170A (en) * | 2020-12-11 | 2021-08-20 | 苏州律点信息科技有限公司 | Video content analysis method and device and cloud server |
CN114722412A (en) * | 2022-04-15 | 2022-07-08 | 北京科杰科技有限公司 | Data security storage method and device, electronic equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070283447A1 (en) * | 2006-06-05 | 2007-12-06 | Jiang Hong | Managing access to a document-processing device using an identification token |
CN102724038A (en) * | 2011-03-30 | 2012-10-10 | 阿里巴巴集团控股有限公司 | Identity authentication method, information acquisition device, and identity authentication device |
CN103078859A (en) * | 2012-12-31 | 2013-05-01 | 普天新能源有限责任公司 | Service system authority management method, equipment and system |
CN104967875A (en) * | 2015-07-28 | 2015-10-07 | 浙江宇视科技有限公司 | Method and device for controlling monitoring video checking authority |
CN105488366A (en) * | 2014-10-13 | 2016-04-13 | 阿里巴巴集团控股有限公司 | Data permission control method and system |
US20160117521A1 (en) * | 2014-05-12 | 2016-04-28 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
CN105703978A (en) * | 2014-11-24 | 2016-06-22 | 武汉物联远科技有限公司 | Smart home control system and method |
CN107277038A (en) * | 2017-07-18 | 2017-10-20 | 北京微影时代科技有限公司 | Access control method, device and system |
CN108256340A (en) * | 2017-12-22 | 2018-07-06 | 中国平安人寿保险股份有限公司 | Collecting method, device, terminal device and storage medium |
CN109409119A (en) * | 2017-08-17 | 2019-03-01 | 北京京东尚科信息技术有限公司 | Data manipulation method and device |
CN109635581A (en) * | 2018-12-12 | 2019-04-16 | 深圳市网心科技有限公司 | A kind of data processing method, equipment, system and storage medium |
-
2019
- 2019-05-20 CN CN201910418985.2A patent/CN111966996A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070283447A1 (en) * | 2006-06-05 | 2007-12-06 | Jiang Hong | Managing access to a document-processing device using an identification token |
CN102724038A (en) * | 2011-03-30 | 2012-10-10 | 阿里巴巴集团控股有限公司 | Identity authentication method, information acquisition device, and identity authentication device |
CN103078859A (en) * | 2012-12-31 | 2013-05-01 | 普天新能源有限责任公司 | Service system authority management method, equipment and system |
US20160117521A1 (en) * | 2014-05-12 | 2016-04-28 | CompuGroup Medical AG | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method |
CN105488366A (en) * | 2014-10-13 | 2016-04-13 | 阿里巴巴集团控股有限公司 | Data permission control method and system |
CN105703978A (en) * | 2014-11-24 | 2016-06-22 | 武汉物联远科技有限公司 | Smart home control system and method |
CN104967875A (en) * | 2015-07-28 | 2015-10-07 | 浙江宇视科技有限公司 | Method and device for controlling monitoring video checking authority |
CN107277038A (en) * | 2017-07-18 | 2017-10-20 | 北京微影时代科技有限公司 | Access control method, device and system |
CN109409119A (en) * | 2017-08-17 | 2019-03-01 | 北京京东尚科信息技术有限公司 | Data manipulation method and device |
CN108256340A (en) * | 2017-12-22 | 2018-07-06 | 中国平安人寿保险股份有限公司 | Collecting method, device, terminal device and storage medium |
CN109635581A (en) * | 2018-12-12 | 2019-04-16 | 深圳市网心科技有限公司 | A kind of data processing method, equipment, system and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113286170A (en) * | 2020-12-11 | 2021-08-20 | 苏州律点信息科技有限公司 | Video content analysis method and device and cloud server |
CN114722412A (en) * | 2022-04-15 | 2022-07-08 | 北京科杰科技有限公司 | Data security storage method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6166749B2 (en) | Context-based data access control | |
US9301140B1 (en) | Behavioral authentication system using a secure element, a behaviometric server and cryptographic servers to authenticate users | |
US20180337771A1 (en) | Policy enforcement via peer devices using a blockchain | |
WO2015124018A1 (en) | Method and apparatus for application access based on intelligent terminal device | |
CN109472675A (en) | Processing method, device, system and the equipment of charter business | |
CN116340955A (en) | Data processing method, device and equipment based on block chain | |
US10496806B2 (en) | Method for secure operation of a computing device | |
US20060117377A1 (en) | Process for securing the access to the resources of an information handling system (I.H.S.) | |
CN106980793B (en) | TrustZone-based universal password storage and reading method, device and terminal equipment | |
CN106648384B (en) | Service calling method and device | |
CN113472774B (en) | Account login-free method, system, device and computer readable storage medium | |
CN111478910A (en) | User identity authentication method and device, electronic equipment and storage medium | |
US10764049B2 (en) | Method for determining approval for access to gate through network, and server and computer-readable recording media using the same | |
CN113704826A (en) | Privacy protection-based business risk detection method, device and equipment | |
CN111966996A (en) | Data processing method and device | |
Amft et al. | " We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments | |
CN111600882A (en) | Block chain-based account password management method and device and electronic equipment | |
US10803155B2 (en) | Method and system for preventing unauthorized computer processing | |
CN112364307B (en) | Software authorization method and related equipment | |
CN110505295B (en) | Unlocking information setting method, device and equipment | |
CN111090850B (en) | Authentication system, method and device | |
KR101594315B1 (en) | Service providing method and server using third party's authentication | |
CN114584314B (en) | Registration method, device, equipment and medium | |
CN115357918A (en) | Authorization control method and device for broadcast control software, terminal equipment and storage medium | |
US20220417267A1 (en) | Optimizing application security based on malicious user intent |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |