CN115879143A - Data security policy configuration method, device and system - Google Patents

Data security policy configuration method, device and system Download PDF

Info

Publication number
CN115879143A
CN115879143A CN202111152460.2A CN202111152460A CN115879143A CN 115879143 A CN115879143 A CN 115879143A CN 202111152460 A CN202111152460 A CN 202111152460A CN 115879143 A CN115879143 A CN 115879143A
Authority
CN
China
Prior art keywords
data
data security
security policy
client
service device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111152460.2A
Other languages
Chinese (zh)
Inventor
董文帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202111152460.2A priority Critical patent/CN115879143A/en
Priority to PCT/CN2022/122075 priority patent/WO2023051595A1/en
Publication of CN115879143A publication Critical patent/CN115879143A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a data security policy configuration method, equipment and a system. The method comprises the following steps: applied to a service device, comprising: receiving a data security policy and indication information of client data, wherein the data security policy is formed by selecting one or more data security capabilities from a data security capability set provided by the service device according to the attribute of the client data, the client data is data which is stored at the service device side and is related to the client device, and the data security capability in the data security capability set is the capability of the service device to process data based on data security; applying the data security policy to the client data based on the indication information. The scheme can flexibly configure the data security policy of the specified data according to the requirement.

Description

数据安全策略配置方法、设备以及系统Data security policy configuration method, device and system

技术领域technical field

本申请涉及数据通信领域,尤其涉及一种数据安全策略配置方法、设备以及系统。The present application relates to the field of data communication, and in particular to a data security policy configuration method, device and system.

背景技术Background technique

数据,作为一种重要的资产,在当今社会发挥着巨大价值。随着数据时代,移动互联网、云计算和大数据等技术的快速发展,不断对数据进行深化挖掘和应用,孕育孵化了各种新的商业模式,例如,打车、外卖等基于位置的服务,共享单车、互联网金融等基于征信的服务等等。这些服务通过收集用户的相关信息,为其提供定制化、个性化的服务,给人们的生活带来了极大便利。但是,这些用户信息往往包含了收入、资产、身份等敏感信息,直接或间接的操作可能造成用户隐私泄露,带来极大的安全隐患。为了解决上述问题,需要对存储的数据进行安全保护。现有的技术条件中,各厂商机械化地存储数据,简单的对数据进行分级分类,并按照分级分类对数据采用不同程度的安全保护。但是,不同用户对同一个分级分类的数据要求的保护力度可能是不同的。Data, as an important asset, exerts great value in today's society. With the rapid development of technologies such as mobile Internet, cloud computing and big data in the data age, data mining and application have been continuously deepened, and various new business models have been incubated, such as location-based services such as taxis and food delivery, sharing Credit-based services such as bicycles and Internet finance, etc. These services provide customized and personalized services by collecting relevant information of users, bringing great convenience to people's lives. However, these user information often contain sensitive information such as income, assets, identity, etc. Direct or indirect operations may cause leakage of user privacy and bring great security risks. In order to solve the above problems, it is necessary to perform security protection on the stored data. In the existing technical conditions, each manufacturer stores data mechanized, simply classifies the data, and adopts different levels of security protection for the data according to the classification. However, different users may require different levels of protection for the same classified data.

发明内容Contents of the invention

本申请提供了一种数据安全策略配置方法、设备以及系统,能够按照需要灵活配置指定数据的数据安全策略。The present application provides a data security policy configuration method, device and system, which can flexibly configure a data security policy for specified data as required.

第一方面,提供了一种数据安全策略配置方法,应用于服务装置,包括:In the first aspect, a data security policy configuration method is provided, which is applied to a service device, including:

接收客户装置发送的数据安全策略以及客户端数据的指示信息,其中,所述数据安全策略是所述客户装置根据所述客户端数据的属性从所述服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成的,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;Receive the data security policy and the instruction information of the client data sent by the client device, wherein the data security policy is that the client device selects one from the data security capability set provided by the service device according to the attributes of the client data Or multiple data security capabilities, the client data is stored on the side of the service device and related to the client device, and the data security capabilities in the data security capability set are the data security capabilities of the service device The ability to process data based on data security;

基于所述指示信息将所述数据安全策略应用于所述客户端数据中。Applying the data security policy to the client data based on the indication information.

上述方案中,能够根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,并将数据安全策略应用于客户端数据的指示信息指示的客户端数据中,能够按照需要灵活配置指定的客户端数据的数据安全策略。In the above solution, one or more data security capabilities can be selected from the data security capability set provided by the service device according to the attributes of the client data to form a data security policy, and the data security policy can be applied to the client indicated by the instruction information of the client data. In the client data, the data security policy of the specified client data can be flexibly configured according to the needs.

在一些可能的设计中,所述接收客户装置发送的数据安全策略以及客户端数据的指示信息,包括:In some possible designs, the receiving the data security policy and the instruction information of the client data sent by the client device includes:

通过数据模型对应的网络传输方式接收客户装置发送的数据安全策略以及客户端数据的指示信息,其中,所述数据安全策略承载于所述数据模型中。The data security policy and the instruction information of the client device sent by the client device are received through the network transmission mode corresponding to the data model, wherein the data security policy is carried in the data model.

上述方案中,数据安全策略通过数据模型进行承载,并通过数据模型对应的网络传输方式进行传输,能够实现客户装置和服务装置之间对灵活配置的数据安全策略进行传输。In the above solution, the data security policy is carried by the data model and transmitted through the network transmission mode corresponding to the data model, which can realize the transmission of the flexibly configured data security policy between the client device and the server device.

在一些可能的设计中,所述数据模型为YANG模型,所述网络传输方式为网络配置协议NETCONF。In some possible designs, the data model is a YANG model, and the network transmission mode is a network configuration protocol NETCONF.

上述方案中,数据模型为YANG模型,网络传输方式为网络配置协议NETCONF的标准化程度高、一致性强、灵活性强、适配成本低。In the above solution, the data model is the YANG model, and the network transmission mode is the network configuration protocol NETCONF, which has a high degree of standardization, strong consistency, strong flexibility, and low adaptation cost.

在一些可能的设计中,所述数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口。In some possible designs, the data model is a structured data serialized file, and the network transmission mode is a remote procedure call (RPC) interface.

上述方案中,数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口的一致性强、灵活性强、易用性强、适用范围广、除了能够适用于数通领域之外,还可以适用于软件领域,适用领域更广。In the above solution, the data model is a serialized file of structural data, and the network transmission method is the remote procedure call RPC interface, which has strong consistency, flexibility, ease of use, and wide application range. In addition to being applicable to the field of data communication In addition, it can also be applied to the software field, and the applicable field is wider.

在一些可能的设计中,所述方法还包括:In some possible designs, the method also includes:

接收客户装置发送的操作指示信息;Receive operation instruction information sent by the client device;

基于所述操作指示信息对所述数据安全策略进行维护操作,其中,所述维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。Perform a maintenance operation on the data security policy based on the operation instruction information, wherein the maintenance operation includes one or more of querying the data security policy, deleting the data security policy, and modifying the data security policy.

上述方案中,客户装置可以通过操作指示信息对数据安全能力集合中的数据安全能力进行查询、删除以及修改,从而使得数据安全能力集合能够更好地匹配用户的需要。In the above solution, the client device can query, delete and modify the data security capabilities in the data security capability set by operating the instruction information, so that the data security capability set can better match the user's needs.

在一些可能的设计中,数据安全能力集合包括敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力中的一种或者多种。In some possible designs, the data security capability set includes one or more of sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities.

上述方案中,数据安全能力集合中的安全能力涵盖了敏感信息、数据加密、存储模式以及数据释放,能够从多个维度确保客户端数据的安全。In the above solution, the security capabilities in the data security capability set cover sensitive information, data encryption, storage mode, and data release, which can ensure the security of client data from multiple dimensions.

第二方面,提供了一种数据安全策略配置方法,应用于客户装置,包括:In the second aspect, a data security policy configuration method is provided, which is applied to a client device, including:

根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;Select one or more data security capabilities from the set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy. The client data is stored on the server side and shared with the client device. For related data, the data security capability in the data security capability set is the capability of the service device to process data based on data security;

向所述服务装置发送所述数据安全策略。Send the data security policy to the service device.

在一些可能的设计中,通过数据模型对应的网络传输方式将所述数据安全策略发送给所述服务装置,其中,所述数据安全策略承载于所述数据模型中。In some possible designs, the data security policy is sent to the service device through a network transmission manner corresponding to the data model, where the data security policy is carried in the data model.

在一些可能的设计中,所述数据模型为YANG模型,所述网络传输方式为网络配置协议NETCONF。In some possible designs, the data model is a YANG model, and the network transmission mode is a network configuration protocol NETCONF.

在一些可能的设计中,所述数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口。In some possible designs, the data model is a structured data serialized file, and the network transmission mode is a remote procedure call (RPC) interface.

在一些可能的设计中,所述方法还包括:In some possible designs, the method also includes:

向所述服务装置发送操作指示信息,其中,所述操作指示信息用于指示对所述数据安全策略进行维护操作,所述维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。Sending operation instruction information to the service device, wherein the operation instruction information is used to instruct to perform maintenance operations on the data security policy, and the maintenance operations include querying the data security policy, deleting the data security policy, and modifying the data security policy. one or more of.

在一些可能的设计中,数据安全能力集合包括敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力中的一种或者多种。In some possible designs, the data security capability set includes one or more of sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities.

在一些可能的设计中,在根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略之前,所述方法还包括:In some possible designs, before selecting one or more data security capabilities from a set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy, the method further includes:

接收所述服务装置发送的数据安全能力集合。Receive the data security capability set sent by the service device.

第三方面,提供了一种数据安全策略配置系统,包括客户装置以及服务装置,In the third aspect, a data security policy configuration system is provided, including a client device and a server device,

所述客户装置用于根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;The client device is used to select one or more data security capabilities from a set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy. The client data is stored on the side of the service device, And for the data related to the client device, the data security capability in the data security capability set is the capability of the service device to process data based on data security;

所述服务装置用于接收所述客户装置发送的数据安全策略以及客户端数据的指示信息,The service device is configured to receive the data security policy and the instruction information of the client data sent by the client device,

所述服务装置还用于基于所述指示信息将所述数据安全策略应用于所述客户端数据中。The service device is further configured to apply the data security policy to the client data based on the indication information.

在一些可能的设计中,所述客户装置用于通过数据模型对应的网络传输方式将所述数据安全策略发送给所述服务装置,其中,所述数据安全策略承载于所述数据模型中。In some possible designs, the client device is configured to send the data security policy to the service device through a network transmission manner corresponding to the data model, where the data security policy is carried in the data model.

在一些可能的设计中,所述数据模型为YANG模型,所述网络传输方式为网络配置协议NETCONF。In some possible designs, the data model is a YANG model, and the network transmission mode is a network configuration protocol NETCONF.

在一些可能的设计中,所述数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口。In some possible designs, the data model is a structured data serialized file, and the network transmission mode is a remote procedure call (RPC) interface.

在一些可能的设计中,所述客户装置用于向所述服务装置发送操作指示信息,其中,所述操作指示信息用于指示对所述数据安全策略进行维护操作,所述维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。In some possible designs, the client device is configured to send operation instruction information to the service device, where the operation instruction information is used to instruct to perform a maintenance operation on the data security policy, and the maintenance operation includes querying data One or more of security policies, deletion of data security policies, and modification of data security policies.

在一些可能的设计中,数据安全能力集合包括敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力中的一种或者多种。In some possible designs, the data security capability set includes one or more of sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities.

在一些可能的设计中,所述客户装置还用于接收所述服务装置发送的数据安全能力集合。In some possible designs, the client device is further configured to receive the data security capability set sent by the service device.

第四方面,提供了一种服务设备,包括:处理器以及存储器,其中,所述处理器执行所述存储器中的程序以运行计算服务和存储服务,从而执行如第一方面任一项所述的方法。In a fourth aspect, there is provided a service device, including: a processor and a memory, wherein the processor executes a program in the memory to run computing services and storage services, so as to perform any one of the first aspect Methods.

第五方面,提供了一种终端设备,包括:处理器以及存储器,其中,所述处理器执行所述存储器中的程序,从而执行如第二方面任一项所述的方法。In a fifth aspect, there is provided a terminal device, including: a processor and a memory, wherein the processor executes a program in the memory, so as to execute the method according to any one of the second aspect.

第六方面,提供了一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算节点上运行时,使得所述计算节点执行如第一方面任一项以及第二方面任一项所述的方法。According to the sixth aspect, there is provided a computer-readable storage medium, which is characterized by including instructions, and when the instructions are run on the computing node, the computing node is made to perform any one of the first aspect and any one of the second aspect. one of the methods described.

附图说明Description of drawings

为了更清楚地说明本申请实施例或背景技术中的技术方案,下面将对本申请实施例或背景技术中所需要使用的附图进行说明。In order to more clearly illustrate the technical solutions in the embodiment of the present application or the background art, the following will describe the drawings that need to be used in the embodiment of the present application or the background art.

图1是本申请提供的一种数据安全策略配置系统的结构示意图;Fig. 1 is a schematic structural diagram of a data security policy configuration system provided by the present application;

图2是图1所示的数据安全策略配置系统的更详细的结构示意图;Fig. 2 is a more detailed structural diagram of the data security policy configuration system shown in Fig. 1;

图3是本申请提供的一种数据安全策略配置方法的结构示意图;FIG. 3 is a schematic structural diagram of a data security policy configuration method provided by the present application;

图4是本申请提供的一种数据安全策略配置方法的结构示意图;FIG. 4 is a schematic structural diagram of a data security policy configuration method provided by the present application;

图5是本申请提供的一种数据安全策略配置系统的结构示意图;FIG. 5 is a schematic structural diagram of a data security policy configuration system provided by the present application;

图6是本申请提供的一种服务设备的结构示意图;FIG. 6 is a schematic structural diagram of a service device provided by the present application;

图7是本申请提供的一种终端设备的结构示意图。FIG. 7 is a schematic structural diagram of a terminal device provided by the present application.

具体实施方式Detailed ways

参见图1,图1是本申请提供的数据安全策略配置系统的结构示意图。如图1所示,本申请提供的数据安全策略配置系统,包括:客户装置侧110以及服务装置侧120。Referring to FIG. 1 , FIG. 1 is a schematic structural diagram of a data security policy configuration system provided by the present application. As shown in FIG. 1 , the data security policy configuration system provided by this application includes: a client device side 110 and a server device side 120 .

客户装置侧110为具有数据收发能力的终端设备。例如,客户装置侧110可以为各种类型的用户设备(user equipment,UE)、手机(mobile phone)、平板电脑(pad)、台式电脑、耳机、音响等。客户装置侧110还可以是机器智能设备如无人驾驶(self-driving)设备、运输安全(transportation safety)设备、虚拟现实(virtual reality,VR)终端设备、增强现实(augmented reality,AR)终端设备、机器类型通信(machine type communication,MTC)设备、工业控制(industrial control)设备、远程医疗(remote medical)设备、智能电网(smart grid)设备、智慧城市(smart city)设备,还可以是可穿戴设备(如智能手表,智能手环,计步器等)等等。此外,客户装置侧110还可以是汽车座舱(cockpit domain)设备,或者汽车座舱设备中的一个模块,例如,座舱域控制器(cockpit domain controller,CDC)、摄像头、屏幕、麦克风、音响、电子钥匙、无钥匙进入或启动系统控制器等模块中的一个或者多个。在某些场景中,具备相类似数据收发能力的终端设备的名称也可能不称为客户装置侧110,但是为了方便描述,本申请实施例中将具有数据收发能力的终端统称为客户装置侧110。The client device side 110 is a terminal device capable of transmitting and receiving data. For example, the client device side 110 may be various types of user equipment (user equipment, UE), mobile phone (mobile phone), tablet computer (pad), desktop computer, earphone, audio system and so on. The client device side 110 may also be a machine intelligent device such as an unmanned driving (self-driving) device, a transportation safety (transportation safety) device, a virtual reality (virtual reality, VR) terminal device, an augmented reality (augmented reality, AR) terminal device , machine type communication (machine type communication, MTC) equipment, industrial control (industrial control) equipment, telemedicine (remote medical) equipment, smart grid (smart grid) equipment, smart city (smart city) equipment, can also be wearable Devices (such as smart watches, smart bracelets, pedometers, etc.) and so on. In addition, the client device side 110 can also be a car cockpit domain device, or a module in the car cockpit device, for example, a cockpit domain controller (cockpit domain controller, CDC), camera, screen, microphone, audio, electronic key , keyless entry or start system controller and other modules or one or more modules. In some scenarios, the name of the terminal equipment with similar data sending and receiving capabilities may not be called the client device side 110, but for the convenience of description, terminals with data sending and receiving capabilities are collectively referred to as the client device side 110 in this embodiment of the application .

服务装置侧120为具有数据存储能力的电子设备。例如,服务装置侧120可以是各种类型的服务器,可以是多个服务器组成的局域网系统,可以是由服务器、网络设备以及存储设备组成的小型或者大型系统,例如,数据中心,云系统(包括公有云、私有云以及混合云),边缘计算系统等等。The server side 120 is an electronic device with data storage capability. For example, the service device side 120 can be various types of servers, it can be a local area network system composed of multiple servers, it can be a small or large system composed of servers, network equipment and storage equipment, such as data centers, cloud systems (including public cloud, private cloud, and hybrid cloud), edge computing systems, and more.

客户装置设置于客户装置侧110,服务装置设置于服务装置侧120,服务装置和客户装置在共同作用下为数据提供存储以及相关的安全服务。服务装置和客户装置可以均是由服务装置侧的生产商或者运营商提供的。生产商或者运营商提供的客户装置可以上传到线上,并由客户从线上下载至客户装置侧110。The client device is disposed on the client device side 110, and the service device is disposed on the service device side 120. The service device and the client device provide storage and related security services for data under joint action. Both the service device and the client device may be provided by a manufacturer or operator on the service device side. The client device provided by the manufacturer or operator can be uploaded to the line, and the client can download it to the client device side 110 from the line.

可以理解,图1所示的数据安全策略配置系统的一层的网络结构、数据安全策略配置系统中的终端设备的数量均只是作为一种具体的示例,在其他的实施例中,还可以是网络结构还可以是二层的网络结构,三层的网络结构等等,终端的数量也可以更少或者更多,此处不作具体限定。It can be understood that the network structure of the first layer of the data security policy configuration system shown in FIG. 1 and the number of terminal devices in the data security policy configuration system are only used as a specific example. In other embodiments, it can also be The network structure may also be a two-layer network structure, a three-layer network structure, etc., and the number of terminals may also be less or more, which is not specifically limited here.

参见图2,图2是图1所示的数据安全策略配置系统的更详细的结构示意图。在图2中,服务装置侧120可以是分布式存储系统,也可以是集中式存储系统。下面将以集中式存储系统为例进行说明。集中式存储系统包括应用服务器121、光纤交换机122、存储系统123。用户通过应用程序来存取数据。运行这些应用程序的计算机被称为“应用服务器”。应用服务器121可以是物理机,也可以是虚拟机。物理应用服务器包括但不限于桌面电脑、服务器、笔记本电脑以及移动设备。应用服务器121通过光纤交换机122访问存储系统123以存取数据。然而,光纤交换机122只是一个可选设备,应用服务器121也可以直接通过网络与存储系统123通信。集中式存储系统的特点是有一个统一的入口,所有从外部设备来的数据都要经过这个入口,这个入口就是集中式存储系统的引擎124。引擎124是集中式存储系统中最为核心的部件,许多存储系统的高级功能都在其中实现。Referring to FIG. 2 , FIG. 2 is a more detailed structural diagram of the data security policy configuration system shown in FIG. 1 . In FIG. 2, the server side 120 may be a distributed storage system or a centralized storage system. The centralized storage system will be described below as an example. The centralized storage system includes an application server 121 , a fiber switch 122 , and a storage system 123 . Users access data through applications. The computers running these applications are called "application servers". The application server 121 may be a physical machine or a virtual machine. Physical application servers include, but are not limited to, desktops, servers, laptops, and mobile devices. The application server 121 accesses the storage system 123 through the optical fiber switch 122 to access data. However, the optical fiber switch 122 is only an optional device, and the application server 121 can also directly communicate with the storage system 123 through the network. The characteristic of the centralized storage system is that there is a unified entrance, and all data from external devices must pass through this entrance, and this entrance is the engine 124 of the centralized storage system. The engine 124 is the most core component in the centralized storage system, where many advanced functions of the storage system are implemented.

引擎124中有一个或多个控制器,图2以引擎124包含两个控制器为例予以说明。控制器0与控制器1之间具有镜像通道,那么当控制器0将一份数据写入其内存126后,可以通过所述镜像通道将所述数据的副本发送给控制器1,控制器1将所述副本存储在自己本地的内存134中。由此,控制器0和控制器1互为备份,当控制器0发生故障时,控制器1可以接管控制器0的业务,当控制器1发生故障时,控制器0可以接管控制器1的业务,从而避免硬件故障导致整个存储系统的不可用。当引擎124中部署有4个控制器时,任意两个控制器之间都具有镜像通道,因此任意两个控制器互为备份。There are one or more controllers in the engine 124 , and FIG. 2 illustrates that the engine 124 includes two controllers as an example. There is a mirror channel between controller 0 and controller 1, so when controller 0 writes a piece of data into its memory 126, it can send a copy of the data to controller 1 through the mirror channel, and controller 1 Store the copy in its own local memory 134 . Therefore, controller 0 and controller 1 are mutual backups. When controller 0 fails, controller 1 can take over the business of controller 0. When controller 1 fails, controller 0 can take over the business of controller 1. business, thereby avoiding the unavailability of the entire storage system caused by hardware failure. When four controllers are deployed in the engine 124, there is a mirror channel between any two controllers, so any two controllers are mutual backups.

引擎124还包含前端接口127和后端接口128,其中前端接口127用于与应用服务器121通信,从而为应用服务器120提供存储服务。而后端接口128用于与硬盘129通信,以扩充存储系统的容量。通过后端接口128,引擎124可以连接更多的硬盘129,从而形成一个非常大的存储资源池。The engine 124 also includes a front-end interface 127 and a back-end interface 128 , wherein the front-end interface 127 is used to communicate with the application server 121 to provide storage services for the application server 120 . The back-end interface 128 is used to communicate with the hard disk 129 to expand the capacity of the storage system. Through the back-end interface 128, the engine 124 can be connected with more hard disks 129, thereby forming a very large storage resource pool.

在硬件上,控制器0至少包括处理器125、内存126。处理器125是一个中央处理器(central processing unit,CPU),用于处理来自存储系统外部(服务器或者其他存储系统)的数据访问请求,也用于处理存储系统内部生成的请求。示例性的,处理器125通过前端接口127接收应用服务器121发送的写数据请求时,会将这些写数据请求中的数据暂时保存在内存126中。当内存126中的数据总量达到一定阈值时,处理器125通过后端接口128将内存126中存储的数据发送给硬盘129进行持久化存储。In terms of hardware, the controller 0 includes at least a processor 125 and a memory 126 . The processor 125 is a central processing unit (central processing unit, CPU), used for processing data access requests from outside the storage system (server or other storage systems), and also used for processing requests generated inside the storage system. Exemplarily, when the processor 125 receives the write data request sent by the application server 121 through the front-end interface 127 , it will temporarily save the data in the write data request in the memory 126 . When the total amount of data in the memory 126 reaches a certain threshold, the processor 125 sends the data stored in the memory 126 to the hard disk 129 through the backend interface 128 for persistent storage.

内存126是指与处理器直接交换数据的内部存储器,它可以随时读写数据,而且速度很快,作为操作系统或其他正在运行中的程序的临时数据存储器。内存包括至少两种存储器,例如内存既可以是随机存取存储器,也可以是只读存储器(read only memory,ROM)。举例来说,随机存取存储器是动态随机存取存储器(dynamic random access memory,DRAM),或者存储级存储器(storage class memory,SCM)。DRAM是一种半导体存储器,与大部分随机存取存储器(random access memory,RAM)一样,属于一种易失性存储器(volatile memory)设备。SCM是一种同时结合传统储存装置与存储器特性的复合型储存技术,存储级存储器能够提供比硬盘更快速的读写速度,但存取速度上比DRAM慢,在成本上也比DRAM更为便宜。然而,DRAM和SCM在本实施例中只是示例性的说明,内存还可以包括其他随机存取存储器,例如静态随机存取存储器(static random access memory,SRAM)等。而对于只读存储器,举例来说,可以是可编程只读存储器(programmable read only memory,PROM)、可抹除可编程只读存储器(erasable programmable read only memory,EPROM)等。另外,内存126还可以是双列直插式存储器模块或双线存储器模块(dual in-line memorymodule,DIMM),即由动态随机存取存储器(DRAM)组成的模块,还可以是固态硬盘(solidstate disk,SSD)。实际应用中,控制器0中可配置多个内存126,以及不同类型的内存126。本实施例不对内存126的数量和类型进行限定。此外,可对内存126进行配置使其具有保电功能。保电功能是指系统发生掉电又重新上电时,内存126中存储的数据也不会丢失。具有保电功能的内存被称为非易失性存储器。The memory 126 refers to an internal memory directly exchanging data with the processor. It can read and write data at any time, and the speed is very fast. It is used as a temporary data storage for the operating system or other running programs. The memory includes at least two types of memory, for example, the memory can be either a random access memory or a read only memory (ROM). For example, the random access memory is dynamic random access memory (DRAM), or storage class memory (storage class memory, SCM). DRAM is a semiconductor memory, and like most random access memories (random access memory, RAM), it is a volatile memory (volatile memory) device. SCM is a composite storage technology that combines the characteristics of traditional storage devices and memory. Storage-class memory can provide faster read and write speeds than hard disks, but the access speed is slower than DRAM, and the cost is also cheaper than DRAM. . However, the DRAM and the SCM are only illustrative in this embodiment, and the memory may also include other random access memories, such as static random access memory (static random access memory, SRAM). As for the read only memory, for example, it may be programmable read only memory (programmable read only memory, PROM), erasable programmable read only memory (erasable programmable read only memory, EPROM) and so on. In addition, the memory 126 can also be a dual in-line memory module or a dual in-line memory module (DIMM), that is, a module composed of dynamic random access memory (DRAM), or a solid state hard disk (solid state). disk, SSD). In practical applications, multiple memories 126 and different types of memories 126 may be configured in the controller 0 . This embodiment does not limit the quantity and type of the memory 126 . In addition, the memory 126 can be configured to have a power saving function. The power saving function means that the data stored in the internal memory 126 will not be lost when the system is powered off and then powered on again. Memory with a power saving function is called non-volatile memory.

内存126中存储有软件程序,处理器125运行内存126中的软件程序可实现对硬盘的管理。例如将硬盘抽象化为存储资源池,然后划分为LUN提供给服务器使用等。这里的LUN其实就是在服务器上看到的硬盘。当然,一些集中式存储系统本身也是文件服务器,可以为服务器提供共享文件服务。The memory 126 stores software programs, and the processor 125 runs the software programs in the memory 126 to manage the hard disk. For example, hard disks are abstracted into storage resource pools, and then divided into LUNs for use by servers. The LUN here is actually the hard disk seen on the server. Of course, some centralized storage systems are also file servers themselves, which can provide shared file services for servers.

控制器1,以及其他图中未示出的控制器,的硬件组件和软件结构与控制器0类似,这里不再赘述。The hardware components and software structures of the controller 1 and other controllers not shown in the figure are similar to those of the controller 0, and will not be repeated here.

需要说明的是,图2中只示出了一个引擎124,然而在实际应用中,存储系统中可包含两个或两个以上引擎124,多个引擎124之间做冗余或者负载均衡。It should be noted that only one engine 124 is shown in FIG. 2 , but in practical applications, the storage system may include two or more engines 124 , and redundancy or load balancing is performed among the multiple engines 124 .

图2所示的是一种盘控一体的集中式存储系统。在该系统中,引擎124具有硬盘槽位,硬盘129可直接部署在引擎124中,后端接口128属于可选配置,当系统的存储空间不足时,可通过后端接口128连接更多的硬盘或硬盘框。Figure 2 shows a centralized storage system with integrated disk control. In this system, the engine 124 has a hard disk slot, and the hard disk 129 can be directly deployed in the engine 124. The back-end interface 128 is an optional configuration. When the storage space of the system is insufficient, more hard disks can be connected through the back-end interface 128. or disk enclosure.

可以理解,图2所示的数据安全策略配置系统仅仅作为具体的示例,在其他的实施例中,数据安全策略配置系统还可以包括更多或者更少的部件,此处不作具体限定。It can be understood that the data security policy configuration system shown in FIG. 2 is only used as a specific example. In other embodiments, the data security policy configuration system may also include more or fewer components, which are not specifically limited here.

参见图3,图3是本申请提供的一种数据安全策略配置方法的结构示意图。如图3所示,本实施例提供的数据安全策略配置方法包括如下步骤:Referring to FIG. 3 , FIG. 3 is a schematic structural diagram of a method for configuring a data security policy provided by the present application. As shown in Figure 3, the data security policy configuration method provided in this embodiment includes the following steps:

S101:服务装置向客户装置发送数据安全能力集合。相应地,客户装置接收服务装置发送的数据安全能力集合。S101: The service device sends a data security capability set to the client device. Correspondingly, the client device receives the data security capability set sent by the service device.

在一具体的实施例中,数据安全能力集合可以包括一个或者多个数据安全能力。其中,数据安全能力是服务装置基于数据安全进行数据处理的能力。数据安全能力集合可以包括多个维度的数据安全能力,每个维度的数据安全能力可以包括一个或者多个数据安全能力。数据安全能力集合包含的数据安全能力的维度越多,数据安全能力就越全面,但是,占据的存储资源和传输资源就越多,相反,数据安全能力集合包含的数据安全能力的维度越少,数据安全能力就越片面,但是,占据的存储资源和传输资源就越少。可以理解,不同的服务装置可以提供不同的数据安全能力集合,例如,第一服务装置可以提供3个维度的数据安全能力,每个维度包括3个数据安全能力,第二服务装置可以提供10个维度的数据安全能力,每个维度包括12个数据安全能力等等。服务装置向客户装置提供的数据安全能力集合中的数据安全能力集合的维度以及每个维度中数据安全能力可以是固定的,也可以是变化的。例如,服务装置可以向客户装置提供的数据安全能力集合固定包括3个维度的数据安全能力,每个维度包括3个数据安全能力。或者,服务装置可以向客户装置提供的数据安全能力集合可以先包括3个维度的数据安全能力,每个维度包括3个数据安全能力,后面增加为数据安全能力集合包括10个维度的数据安全能力,每个维度包括12个数据安全能力。为了陈述简便,上述例子中均以每个维度的数据安全能力的数量均相等为例进行说明,在实际应用中,每个维度的数据安全能力的数量可以是不相等的,此处不做具体限定。In a specific embodiment, the data security capability set may include one or more data security capabilities. Wherein, the data security capability is the capability of the service device to process data based on data security. The data security capability set may include multiple dimensions of data security capabilities, and each dimension of data security capabilities may include one or more data security capabilities. The more data security capability dimensions the data security capability set contains, the more comprehensive the data security capability will be, but the more storage resources and transmission resources will be occupied. On the contrary, the data security capability set will contain fewer data security capability dimensions. The more one-sided the data security capability is, the less storage resources and transmission resources are occupied. It can be understood that different service devices can provide different sets of data security capabilities. For example, the first service device can provide data security capabilities in three dimensions, each dimension includes three data security capabilities, and the second service device can provide 10 data security capabilities. Dimension data security capabilities, each dimension includes 12 data security capabilities and so on. The dimension of the data security capability set in the data security capability set provided by the service device to the client device and the data security capability in each dimension may be fixed or variable. For example, the data security capability set provided by the service device to the client device fixedly includes data security capabilities in three dimensions, and each dimension includes three data security capabilities. Alternatively, the data security capability set that the service device can provide to the client device may first include data security capabilities in three dimensions, each dimension includes three data security capabilities, and is added later as a data security capability set that includes ten dimensions of data security capabilities , each dimension includes 12 data security capabilities. For the sake of simplicity, the above examples all take the same number of data security capabilities in each dimension as an example. In practical applications, the number of data security capabilities in each dimension may be unequal, and no specific details are given here. limited.

在一更具体的实施例中,数据安全能力集合可以包括如下几个维度的数据安全能力中的一种或者多种:敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力。其中,敏感信息安全能力可以对不同的数据类别,例如,资产信息、身份信息、生物特征信息、消费习惯信息、出行信息等等,提供不同保护力度的能力。数据加密安全能力可以通过采用不同的加密算法,例如,无加密算法、数据加密算法(data encryptionalgorithm,DEA)、罗纳德·李维斯特(Ron Rivest)-阿迪·萨莫尔(Adi Shamir)-伦纳德·阿德曼(Leonard Adleman)算法(简称RSA算法)进行加密,从而提供不同保护力度的能力。存储模式安全能力可以通过采用不同的存储隔离方式,例如,物理隔离(physical_isolation)、逻辑隔离(logic_isolation),从而提供不同保护力度的能力。数据释放安全能力可以通过提供不同的数据释放方式,例如,直接释放(direct)、可回收(recycle)、需要复写地址(reset)等等,从而提供不同保护力度的能力。In a more specific embodiment, the set of data security capabilities may include one or more of the following dimensions of data security capabilities: sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities . Among them, the sensitive information security capability can provide different protection capabilities for different data categories, such as asset information, identity information, biometric information, consumption habit information, travel information, etc. Data encryption security capabilities can be achieved by using different encryption algorithms, for example, no encryption algorithm, data encryption algorithm (data encryption algorithm, DEA), Ronald Rivest (Ron Rivest)-Adi Shamir (Adi Shamir)-Len The Leonard Adleman algorithm (RSA algorithm for short) is used for encryption, thus providing the capability of different protection levels. The security capability of the storage mode can provide different protection capabilities by adopting different storage isolation methods, for example, physical isolation (physical_isolation) and logical isolation (logic_isolation). The data release security capability can provide different protection levels by providing different data release methods, such as direct release (direct), recycle (recycle), need to rewrite address (reset), and so on.

在一具体的实施例中,数据安全能力集合可以是客户装置通过查询手册、协议协商等方式从服务装置获取的。In a specific embodiment, the data security capability set may be obtained by the client device from the service device by querying a manual, protocol negotiation, and other methods.

S102:客户装置根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略。S102: The client device selects one or more data security capabilities from the data security capability set provided by the service device according to the attributes of the client data to form a data security policy.

在一具体的实施例中,客户端数据是被存储在服务装置侧、且与客户装置相关的数据。客户端数据可以存储在服务装置中,或者,存储在服务装置连接的存储器中等等。客户端数据可以是与客户装置相关的任何数据,例如,客户装置上传的资产数据、购物数据、出行数据、身份数据、住址数据、工作数据、生物特征数据等等。In a specific embodiment, the client data is data stored on the service device side and related to the client device. Client data may be stored in the service device, or in a memory connected to the service device, or the like. The client data can be any data related to the client device, for example, asset data, shopping data, travel data, identity data, address data, work data, biometric data, etc. uploaded by the client device.

在一个具体的实施例中,客户端数据的属性可以包括数据保密性、数据量、数据结构、数据长度、数据存储方式、数据重复性、数据采集方式、数据可信度、数据共同性、数据指向性等等。此外,客户端数据的属性还可以是其他自行定义的属性,此处不作具体限定。In a specific embodiment, the attributes of client data may include data confidentiality, data volume, data structure, data length, data storage method, data repeatability, data collection method, data credibility, data commonality, data Directivity and so on. In addition, the attributes of the client data may also be other self-defined attributes, which are not specifically limited here.

在一具体的实施例中,数据安全策略可以是由数据安全能力集合中选择的一个或者多个数据安全能力构成的。数据安全策略可以是从数据安全能力集合中同一个维度选择多个数据安全能力构成的,也可以是从数据安全能力集合中多个维度分别选择多个数据安全能力构成的,此处不作具体限定。举个例子进行说明,数据安全策略可以由从敏感信息安全能力中选择的生物特征信息,从数据加密安全能力中选择的RSA算法,从存储模式安全能力中选择的物理隔离,从数据释放安全能力中选择的直接释放构成的。可以理解,上述例子仅仅作为具体的示例,在其他的实施例中,数据安全策略还可以包括更多或者更少的数据安全能力,或者数据安全能力可以是从其他的维度中进行选择的,此处不作具体限定。In a specific embodiment, the data security policy may be composed of one or more data security capabilities selected from the data security capability set. The data security policy can be composed of multiple data security capabilities selected from the same dimension in the data security capability set, or can be composed of multiple data security capabilities selected from multiple dimensions in the data security capability set, which is not specifically limited here . To illustrate with an example, the data security policy can be selected from the biometric information selected from the sensitive information security capability, the RSA algorithm selected from the data encryption security capability, the physical isolation selected from the storage mode security capability, and the data release security capability Consists of the immediate release selected in the It can be understood that the above example is only a specific example. In other embodiments, the data security policy may also include more or less data security capabilities, or the data security capabilities may be selected from other dimensions. There is no specific limitation.

在一具体的实施例中,数据安全策略可以承载于数据模型中。其中,数据模型可以是Yang模型或者结构数据序列化(proto)文件、Json、可扩展标记语言(extensible markuplanguage)、thrift等等。In a specific embodiment, the data security policy can be carried in the data model. Wherein, the data model may be a Yang model or a structural data serialization (proto) file, Json, extensible markup language (extensible markup language), thrift, and the like.

在一具体的实施例中,数据安全策略可以被客户装置进行编辑的。具体地,客户装置向服务装置发送操作指示信息。相应地,服务装置接收客户装置发送的操作指示信息。服务装置基于操作指示信息对数据安全策略进行维护操作。其中,维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。在一更具体的实施例中,客户装置可以通过Hello报文协商感知服务装置的数据安全能力集合,可以通过网络配置协议(network configuration protocol,NETCONF)中的NETCONF edit-config指令完成修改数据安全策略的操作,可以通过NETCONF中的NETCONF get-config指令完成查询修改数据安全策略的操作,可以通过NETCONF中的NETCONF delete-config指令完成删除数据安全策略的操作等等。In a specific embodiment, the data security policy can be edited by the client device. Specifically, the client device sends operation instruction information to the service device. Correspondingly, the service device receives the operation indication information sent by the client device. The service device performs maintenance operations on the data security policy based on the operation instruction information. Wherein, the maintenance operation includes one or more of querying the data security policy, deleting the data security policy, and modifying the data security policy. In a more specific embodiment, the client device can negotiate the data security capability set of the perceived service device through the Hello message, and can modify the data security policy through the NETCONF edit-config command in the network configuration protocol (network configuration protocol, NETCONF) You can query and modify the data security policy through the NETCONF get-config command in NETCONF, and you can delete the data security policy through the NETCONF delete-config command in NETCONF.

S103:客户装置向服务装置发送数据安全策略以及客户端数据的指示信息。相应地,服务装置接收客户装置发送的数据安全策略以及客户端数据的指示信息。S103: The client device sends the data security policy and instruction information of the client data to the server device. Correspondingly, the service device receives the data security policy and the indication information of the client data sent by the client device.

在一具体的实施例中,客户装置向服务装置发送数据安全策略以及客户端数据的指示信息中,客户装置向服务装置发送的数据安全策略以及客户装置向服务装置发送的客户端数据的指示信息可以承载于同一指令中,也可以分别承载于先后两个指令中。In a specific embodiment, in the data security policy sent by the client device to the server device and the instruction information of the client data, the data security policy sent by the client device to the server device and the instruction information of the client data sent by the client device to the server device It can be carried in the same command, or it can be carried in two successive commands respectively.

在一具体的实施例中,客户装置通过数据模型对应的网络传输方式将所述数据安全策略发送给所述服务装置。举例说明,当数据模型为YANG模型时,客户装置可以通过YANG模型对应的NETCONF将数据安全策略发送给服务装置。当数据模型为YANG模型时,客户装置可以通过proto文件对应的远程过程调用(remote procedure call,RPC)接口将数据安全策略发送给服务装置。In a specific embodiment, the client device sends the data security policy to the service device through a network transmission manner corresponding to the data model. For example, when the data model is a YANG model, the client device can send the data security policy to the server device through NETCONF corresponding to the YANG model. When the data model is a YANG model, the client device can send the data security policy to the server device through a remote procedure call (remote procedure call, RPC) interface corresponding to the proto file.

在一具体的实施例中,客户端数据的指示信息可以是客户端数据的唯一标识,例如,可以是客户端数据的路径信息,可以是客户端数据的标签信息等等,此处不作具体限定。指示信息可以承载于数据模型之中,也可以独立于数据模型之外。当指示信息可以承载于数据模型之中时,数据安全策略和指示信息可以分别承载于不同的数据模型中,例如,数据安全策略可以承载于YANG模型中,指示信息承载于proto文件中;或者,数据安全策略和指示信息也可以承载于同一种数据模型的两个不同数据模型中,例如,数据安全策略承载于第一YANG模型中,指示信息承载于第二YANG模型中;或者,数据安全策略和指示信息也可以承载于同一个数据模型,例如,数据安全策略和指示信息承载于同一个YANG模型中。In a specific embodiment, the indication information of the client data may be the unique identifier of the client data, for example, it may be the path information of the client data, it may be the label information of the client data, etc., and it is not specifically limited here . Indication information can be carried in the data model, or it can be independent of the data model. When the instruction information can be carried in the data model, the data security policy and the instruction information can be carried in different data models, for example, the data security policy can be carried in the YANG model, and the instruction information can be carried in the proto file; or, The data security policy and instruction information can also be carried in two different data models of the same data model, for example, the data security policy is carried in the first YANG model, and the instruction information is carried in the second YANG model; or, the data security policy and instruction information can also be carried in the same data model, for example, data security policy and instruction information are carried in the same YANG model.

S104:服务装置基于指示信息将数据安全策略应用于客户端数据中。S104: The service device applies the data security policy to the client data based on the indication information.

在一具体的实施例中,服务装置基于指示信息将数据安全策略应用于客户端数据中,包括以下至少两个方式:(1)服务装置自动根据指示信息将数据安全策略应用于客户端数据中。(2)客户装置通过NETCONF edit-config指令指示服务装置根据指示信息将数据安全策略应用于客户端数据中。In a specific embodiment, the service device applies the data security policy to the client data based on the instruction information, including the following at least two ways: (1) The service device automatically applies the data security policy to the client data according to the instruction information . (2) The client device instructs the server device to apply the data security policy to the client data according to the instruction information through the NETCONF edit-config command.

上述方案中,能够根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,并将数据安全策略应用于客户端数据的指示信息指示的客户端数据中,能够按照需要灵活配置指定的客户端数据的数据安全策略。In the above solution, one or more data security capabilities can be selected from the data security capability set provided by the service device according to the attributes of the client data to form a data security policy, and the data security policy can be applied to the client indicated by the instruction information of the client data. In the client data, the data security policy of the specified client data can be flexibly configured according to the needs.

当客户端数据包括多个数据时,可以通过图3所示的数据安全策略配置方法为所述多个数据指定不同的数据安全策略。举例来说,当客户端数据包括数据1、数据2、数据3时,可以为数据1指定数据安全策略1,为数据2指定数据安全策略2,为数据3指定数据安全策略3。又例如,当客户端数据包括数据1、数据2、数据3时,可以为数据1指定数据安全策略1,为数据2指定数据安全策略1,为数据3指定数据安全策略2。可以理解,上述例子仅仅作为具体的示例,在实际应用中,客户端数据的数量、数据安全策略的数量以及、客户端数据和数据安全策略之间的对应关系均可以不同,此处不作具体限定。When the client data includes multiple data, different data security policies may be specified for the multiple data through the data security policy configuration method shown in FIG. 3 . For example, when the client data includes data 1, data 2, and data 3, data security policy 1 can be specified for data 1, data security policy 2 can be specified for data 2, and data security policy 3 can be specified for data 3. For another example, when the client data includes data 1, data 2, and data 3, data security policy 1 can be specified for data 1, data security policy 1 can be specified for data 2, and data security policy 2 can be specified for data 3. It can be understood that the above example is only a specific example. In actual applications, the number of client data, the number of data security policies, and the corresponding relationship between client data and data security policies may be different, and no specific limitation is made here. .

参见图4,图4是本申请提供的一种数据安全策略配置方法的结构示意图。如图4所示,本实施例提供的数据安全策略配置方法包括如下步骤:Referring to FIG. 4 , FIG. 4 is a schematic structural diagram of a method for configuring a data security policy provided by the present application. As shown in Figure 4, the data security policy configuration method provided in this embodiment includes the following steps:

S201:服务装置向客户装置发送数据安全能力集合。相应地,客户装置接收服务装置发送的数据安全能力集合。S201: The service device sends a data security capability set to the client device. Correspondingly, the client device receives the data security capability set sent by the service device.

S202:客户装置根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略。S202: The client device selects one or more data security capabilities from the data security capability set provided by the service device according to the attributes of the client data to form a data security policy.

S203:客户装置向服务装置发送数据安全策略以及数据数据安全策略的标识。相应地,服务装置接收客户装置发送的数据安全策略以及数据数据安全策略的标识。S203: the client device sends the data security policy and the identifier of the data security policy to the server device. Correspondingly, the service device receives the data security policy and the identifier of the data security policy sent by the client device.

在一具体的实施例中,客户装置可以重复执行步骤S202至步骤S203,从而配置多条数据安全策略。例如,客户装置可以重复执行5次步骤S202至步骤S203,从而配置数据安全策略1至数据安全策略5,然后,为数据安全策略1至数据安全策略5建立各自唯一的标识,并将数据安全策略1至数据安全策略5以及各自唯一的标识分别发送给服务装置。In a specific embodiment, the client device may repeatedly execute steps S202 to S203 to configure multiple data security policies. For example, the client device may repeatedly execute steps S202 to S203 five times to configure data security policy 1 to data security policy 5, and then establish unique identifiers for data security policy 1 to data security policy 5, and set the data security policy 1 to data security policy 5 and their unique identifiers are sent to the service device respectively.

S204:服务装置存储数据安全策略。S204: The service device stores the data security policy.

在一具体的实施例中,承接步骤S203中的举例,服务装置中可以将数据安全策略1至数据安全策略5以及各自唯一的标识对应进行存储。在一更具体的实施例中,服务装置中可以存储有如表1所示的数据安全策略表:In a specific embodiment, following the example in step S203, the service device may store data security policy 1 to data security policy 5 and their respective unique identifiers in correspondence. In a more specific embodiment, the data security policy table shown in Table 1 may be stored in the service device:

表1 数据安全策略表Table 1 Data Security Policy Table

Figure BDA0003287571980000081
Figure BDA0003287571980000081

Figure BDA0003287571980000091
Figure BDA0003287571980000091

可以理解,上述表1仅仅作为具体的实例,在其他的实施例中,数据安全策略的标识和数据安全策略的存储方式还可以其他的形式,此处不作具体限定。It can be understood that the above Table 1 is only used as a specific example. In other embodiments, the identification of the data security policy and the storage method of the data security policy may also be in other forms, which are not specifically limited here.

S205:客户装置向服务装置发送数据安全策略的标识以及客户端数据的指示信息。相应地,服务装置接收客户装置发送的数据安全策略的标识以及客户端数据的指示信息。S205: The client device sends the identification of the data security policy and the indication information of the client data to the server device. Correspondingly, the service device receives the identification of the data security policy and the indication information of the client data sent by the client device.

S206:服务装置基于指示信息将根据所述标识查找到的数据安全策略应用于客户端数据中。S206: The service device applies the data security policy found according to the identifier to the client data based on the indication information.

在一具体的实施例中,承接步骤S203中的举例,服务装置将数据安全策略应用于客户端数据中可以是:服务装置将数据安全策略1应用于客户端数据1-1000,将数据安全策略2应用于客户端数据1001-10000,将数据安全策略3应用于客户端数据10001-20000等等。In a specific embodiment, following the example in step S203, the service device applies the data security policy to the client data as follows: the service device applies the data security policy 1 to the client data 1-1000, and applies the data security policy 2 is applied to client data 1001-10000, data security policy 3 is applied to client data 10001-20000 and so on.

为了简便起见,本实施例中并没有对数据安全能力集合、数据安全能力、数据安全能力集合的编辑方式、客户端数据、客户端数据的属性、数据安全策略、客户端数据的指示信息进行具体的介绍,具体请参见图3以及相关描述。For the sake of brevity, in this embodiment, there is no detailed description of the data security capability set, data security capability, editing method of the data security capability set, client data, attributes of client data, data security policies, and instruction information of client data. For the introduction, please refer to Figure 3 and related descriptions for details.

参见图5,图5是本申请提供的一种数据安全策略配置系统的结构示意图。如图5所示,本实施方式的数据安全策略配置系统包括:客户装置210以及服务装置220。Referring to FIG. 5 , FIG. 5 is a schematic structural diagram of a data security policy configuration system provided by the present application. As shown in FIG. 5 , the data security policy configuration system in this embodiment includes: a client device 210 and a server device 220 .

客户装置210可以包括构成模块211以及发送模块212。The client device 210 may include a configuration module 211 and a sending module 212 .

构成模块211用于根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力。The composition module 211 is used to select one or more data security capabilities from the data security capabilities set provided by the service device according to the attributes of the client data to form a data security policy, the client data is stored on the side of the service device, and For the data related to the client device, the data security capability in the data security capability set is the capability of the service device to process data based on data security.

发送模块212用于向所述服务装置发送所述数据安全策略。The sending module 212 is configured to send the data security policy to the service device.

服务装置220可以包括接收模块221以及应用模块222。The service device 220 may include a receiving module 221 and an application module 222 .

接收模块221用于接收客户装置发送的数据安全策略以及客户端数据的指示信息,其中,所述数据安全策略是所述客户装置根据所述客户端数据的属性从所述服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成的,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;The receiving module 221 is configured to receive the data security policy and the indication information of the client data sent by the client device, wherein the data security policy is the data security policy provided by the client device from the service device according to the attributes of the client data. One or more data security capabilities are selected from the capability set. The client data is data stored on the service device side and related to the client device. The data security capabilities in the data security capability set is the ability of the service device to process data based on data security;

应用模块222用于基于所述指示信息将所述数据安全策略应用于所述客户端数据中。The application module 222 is configured to apply the data security policy to the client data based on the indication information.

上述方案中,客户装置210以及服务装置220仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将客户装置210以及服务装置220的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。In the above solution, the client device 210 and the server device 220 are only illustrated by the division of the above-mentioned functional modules. In practical applications, the above-mentioned function allocation can be completed by different functional modules according to needs, that is, the client device 210 and the server device 220 The internal structure of the system is divided into different functional modules to complete all or part of the functions described above.

为了简便起见,本实施例中并没有对数据安全能力集合、数据安全能力、数据安全能力集合的编辑方式、客户端数据、客户端数据的属性、数据安全策略、客户端数据的指示信息进行具体的介绍,具体请参见图3以及相关描述。图5中的数据安全策略配置系统中的客户装置210可以执行图3以及图4所示数据安全策略配置方法中客户装置所执行的步骤,图5中的数据安全策略配置系统中的服务装置220可以执行图3以及图4所示数据安全策略配置方法中服务装置所执行的步骤。For the sake of brevity, in this embodiment, there is no detailed description of the data security capability set, data security capability, editing method of the data security capability set, client data, attributes of client data, data security policies, and instruction information of client data. For the introduction, please refer to Figure 3 and related descriptions for details. The client device 210 in the data security policy configuration system in FIG. 5 can execute the steps performed by the client device in the data security policy configuration method shown in FIG. 3 and FIG. 4 , and the service device 220 in the data security policy configuration system in FIG. 5 The steps performed by the service device in the data security policy configuration method shown in FIG. 3 and FIG. 4 can be executed.

参见图6,图6示出了本申请一个示例性实施例提供的服务设备300的结构示意图,该服务设备300可以由一般性的总线体系结构来实现。Referring to FIG. 6, FIG. 6 shows a schematic structural diagram of a service device 300 provided by an exemplary embodiment of the present application. The service device 300 may be implemented by a general bus architecture.

服务设备300包括至少一个处理器301、通信总线302、存储器303以及至少一个通信接口304。The service device 300 includes at least one processor 301 , a communication bus 302 , a memory 303 and at least one communication interface 304 .

处理器301可以是一个通用CPU、NP、微处理器、或者可以是一个或多个用于实现本申请方案的集成电路,例如,专用集成电路(application-specific integrated circuit,ASIC),可编程逻辑器件(programmable logic device,PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,CPLD),现场可编程逻辑门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。The processor 301 may be a general-purpose CPU, NP, microprocessor, or may be one or more integrated circuits for realizing the scheme of the present application, for example, an application-specific integrated circuit (application-specific integrated circuit, ASIC), programmable logic A device (programmable logic device, PLD) or a combination thereof. The aforementioned PLD may be a complex programmable logic device (complex programmable logic device, CPLD), a field-programmable gate array (field-programmable gate array, FPGA), a generic array logic (generic array logic, GAL) or any combination thereof.

通信总线302用于在上述组件之间传送信息。通信总线302可以分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication bus 302 is used to transfer information between the aforementioned components. The communication bus 302 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.

存储器303可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其它类型的静态存储设备,也可以是随机存取存储器(random access memory,RAM)或者可存储信息和指令的其它类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compactdisc read-only memory,CD-ROM)或其它光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其它磁存储设备,或者是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其它介质,但不限于此。存储器303可以是独立存在,并通过通信总线302与处理器301相连接。存储器303也可以和处理器301集成在一起。The memory 303 may be a read-only memory (read-only memory, ROM) or other types of static storage devices capable of storing static information and instructions, or may be a random access memory (random access memory, RAM) or capable of storing information and instructions Other types of dynamic storage devices can also be electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), read-only optical disc (compactdisc read-only memory, CD-ROM) or other optical disc storage, Optical disc storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or devices that can be used to carry or store desired program code in the form of instructions or data structures and Any other medium capable of being accessed by a computer, but not limited to. The memory 303 may exist independently, and is connected to the processor 301 through the communication bus 302 . The memory 303 can also be integrated with the processor 301 .

通信接口304使用任何收发器一类的装置,用于与其它设备或通信网络通信。通信接口304包括有线通信接口,还可以包括无线通信接口。其中,有线通信接口例如可以为以太网接口。以太网接口可以是光接口,电接口或其组合。无线通信接口可以为无线局域网(wireless local area networks,WLAN)接口,蜂窝网络通信接口或其组合等。Communication interface 304 utilizes any transceiver-like device for communicating with other devices or a communication network. The communication interface 304 includes a wired communication interface, and may also include a wireless communication interface. Wherein, the wired communication interface may be an Ethernet interface, for example. The Ethernet interface can be an optical interface, an electrical interface or a combination thereof. The wireless communication interface may be a wireless local area network (wireless local area networks, WLAN) interface, a cellular network communication interface, or a combination thereof.

在具体实现中,作为一种实施例,处理器301可以包括一个或多个CPU,如图6中所示的CPU0和CPU1。In a specific implementation, as an embodiment, the processor 301 may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 6 .

在具体实现中,作为一种实施例,服务设备300可以包括多个处理器,如图6中所示的处理器301和处理器305。这些处理器中的每一个可以是一个单核处理器(single-CPU),也可以是一个多核处理器(multi-CPU)。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(如计算机程序指令)的处理核。In a specific implementation, as an embodiment, the service device 300 may include multiple processors, such as the processor 301 and the processor 305 shown in FIG. 6 . Each of these processors can be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data such as computer program instructions.

在具体实现中,作为一种实施例,服务设备300还可以包括输出设备和输入设备。输出设备和处理器301通信,可以以多种方式来显示信息。例如,输出设备可以是液晶显示器(liquid crystal display,LCD)、发光二级管(light emitting diode,LED)显示设备、阴极射线管(cathode ray tube,CRT)显示设备或投影仪(projector)等。输入设备和处理器301通信,可以以多种方式接收用户的输入。例如,输入设备可以是鼠标、键盘、触摸屏设备或传感设备等。In a specific implementation, as an example, the service device 300 may further include an output device and an input device. Output devices are in communication with processor 301 and can display information in a variety of ways. For example, the output device may be a liquid crystal display (liquid crystal display, LCD), a light emitting diode (light emitting diode, LED) display device, a cathode ray tube (cathode ray tube, CRT) display device, or a projector (projector), etc. The input device communicates with the processor 301 and can receive user input in various ways. For example, the input device may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.

在一些实施例中,存储器303用于存储执行本申请方案的程序代码310,处理器301可以执行存储器303中存储的程序代码310。也即是,服务设备300可以通过处理器301以及存储器303中的程序代码310,来实现图3以及图4所示的方法实施例中服务装置执行的步骤。或者说,图3以及图4中的服务装置可以被设置在图6所示的服务设备之上。In some embodiments, the memory 303 is used to store the program code 310 for implementing the solution of the present application, and the processor 301 can execute the program code 310 stored in the memory 303 . That is, the service device 300 can implement the steps performed by the service device in the method embodiments shown in FIG. 3 and FIG. 4 through the processor 301 and the program code 310 in the memory 303 . In other words, the service devices shown in FIG. 3 and FIG. 4 can be set on the service device shown in FIG. 6 .

本申请实施例的服务设备300可对应于上述方法实施例中的服务装置,并且,该服务设备300中的处理器301、通信接口304等可以实现上述各个方法实施例中的设备所具有的功能和/或所实施的各种步骤和方法。为了简洁,在此不再赘述。The service device 300 in the embodiment of the present application may correspond to the service device in the above-mentioned method embodiments, and the processor 301, the communication interface 304, etc. in the service device 300 may realize the functions of the devices in the above-mentioned method embodiments And/or various steps and methods implemented. For the sake of brevity, details are not repeated here.

图5中的服务装置220中的接收模块221可以相当于服务设备300中的通信接口304;服务装置300的应用模块222可以相当于服务设备300中的处理器301。The receiving module 221 in the service device 220 in FIG. 5 may be equivalent to the communication interface 304 in the service device 300 ; the application module 222 in the service device 300 may be equivalent to the processor 301 in the service device 300 .

参见图7,图7是以终端设备为智能终端为例,图7是一种实现方式的智能终端的结构框图。如图7所示,智能终端可包括:基带芯片410、存储器415,包括一个或多个计算机可读存储介质、射频(RF)模块416、外围系统417。这些部件可在一个或多个通信总线414上通信。Referring to FIG. 7, FIG. 7 takes the terminal device as an example of a smart terminal, and FIG. 7 is a structural block diagram of a smart terminal in an implementation manner. As shown in FIG. 7 , the smart terminal may include: a baseband chip 410 , a memory 415 including one or more computer-readable storage media, a radio frequency (RF) module 416 , and a peripheral system 417 . These components may communicate over one or more communication buses 414 .

外围系统417主要用于实现智能终端和用户/外部环境之间的交互功能,主要包括智能终端的输入输出装置。具体实现中,外围系统417可包括:触摸屏控制器418、按键控制器419、音频控制器420以及传感器管理模块421。其中,各个控制器可与各自对应的外围设备,例如触摸屏423、按键424、音频电路425以及传感器426,耦合。在一些实施例中,传感器426中的手势传感器可用于接收用户输入的手势控制操作。传感器426中的压力传感器可设置于触摸屏423的下方,可用于采集用户通过触摸屏423输入触控操作时作用于触摸屏423上的触控压力。需要说明的,外围系统417还可以包括其他I/O外设。The peripheral system 417 is mainly used to realize the interactive function between the smart terminal and the user/external environment, and mainly includes the input and output devices of the smart terminal. In a specific implementation, the peripheral system 417 may include: a touch screen controller 418 , a button controller 419 , an audio controller 420 and a sensor management module 421 . Wherein, each controller can be coupled with its corresponding peripheral devices, such as touch screen 423 , keys 424 , audio circuit 425 and sensor 426 . In some embodiments, a gesture sensor in sensors 426 may be used to receive gesture control operations input by a user. The pressure sensor in the sensor 426 can be disposed under the touch screen 423 and can be used to collect the touch pressure acting on the touch screen 423 when the user inputs a touch operation through the touch screen 423 . It should be noted that the peripheral system 417 may also include other I/O peripherals.

基带芯片410可集成包括:一个或多个处理器411、时钟模块412以及电源管理模块413。集成于基带芯片410中的时钟模块412主要用于为处理器411产生数据传输和时序控制所需要的时钟。集成于基带芯片410中的电源管理模块413主要用于为处理器411、射频模块416以及外围系统提供稳定的、高精确度的电压。The baseband chip 410 may include: one or more processors 411 , a clock module 412 and a power management module 413 . The clock module 412 integrated in the baseband chip 410 is mainly used for generating the clock required for data transmission and timing control for the processor 411 . The power management module 413 integrated in the baseband chip 410 is mainly used to provide stable and high-precision voltage for the processor 411, the radio frequency module 416 and peripheral systems.

射频(RF)模块416用于接收和发送射频信号,主要集成了智能终端的接收器和发射器。射频(RF)模块416通过射频信号与通信网络和其他通信设备通信。具体实现中,射频(RF)模块416可包括但不限于:天线系统、RF收发器、一个或多个放大器、调谐器、一个或多个振荡器、数字信号处理器、CODEC芯片、SIM卡和存储介质等。此外,射频模块416还可以包括WIFI,蓝牙等等短距离无线通信模块。在一些实施例中,可在单独的芯片上实现射频(RF)模块416。The radio frequency (RF) module 416 is used to receive and send radio frequency signals, and mainly integrates the receiver and transmitter of the smart terminal. A radio frequency (RF) module 416 communicates with communication networks and other communication devices via radio frequency signals. In a specific implementation, the radio frequency (RF) module 416 may include, but is not limited to: an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chip, a SIM card and storage media, etc. In addition, the radio frequency module 416 may also include short-distance wireless communication modules such as WIFI and Bluetooth. In some embodiments, radio frequency (RF) module 416 may be implemented on a separate chip.

存储器415可以包括是随机存取存储器(Random Access Memory,RAM)、快闪存储器(Flash Memory)等,也可以是RAM,只读存储器(Read-Only Memory,ROM)或者硬盘(HardDisk Drive,HDD)或固态硬盘(Solid-State Drive,SSD)。存储器415可以存储操作系统、通信程序、用户界面程序、浏览器、数据安全应用以及其他数据安全应用等等。Memory 415 may include random access memory (Random Access Memory, RAM), flash memory (Flash Memory), etc., and may also be RAM, read-only memory (Read-Only Memory, ROM) or hard disk (HardDisk Drive, HDD) Or solid-state drive (Solid-State Drive, SSD). The memory 415 can store operating systems, communication programs, user interface programs, browsers, data security applications, other data security applications, and the like.

在一些实施例中,存储器415用于存储执行本申请方案的程序代码,基带芯片410可以执行存储器415中存储的程序代码。也即是,终端设备可以通过基带芯片410以及存储器415中的程序代码,来实现图3以及图4所示的方法实施例中客户装置执行的步骤。或者说,图3以及图4所示的客户装置可以被设置在图7所示的终端设备之上。In some embodiments, the memory 415 is used to store program codes for executing the solution of the present application, and the baseband chip 410 can execute the program codes stored in the memory 415 . That is, the terminal device can implement the steps performed by the client device in the method embodiments shown in FIG. 3 and FIG. 4 through the baseband chip 410 and the program codes in the memory 415 . Alternatively, the client devices shown in FIG. 3 and FIG. 4 may be set on the terminal device shown in FIG. 7 .

本申请实施例的终端设备可对应于上述方法实施例中的客户装置,并且,该终端设备中的基带芯片410、射频(RF)模块416等可以实现上述各个方法实施例中的设备所具有的功能和/或所实施的各种步骤和方法。为了简洁,在此不再赘述。The terminal device in the embodiment of the present application may correspond to the client device in the above method embodiment, and the baseband chip 410, the radio frequency (RF) module 416, etc. in the terminal device may realize the functions of the devices in the above method embodiments functions and/or various steps and methods implemented. For the sake of brevity, details are not repeated here.

图5中的客户装置210中的发送模块212可以相当于终端设备中的射频(RF)模块416;客户装置210的构成模块211可以相当于终端设备中的基带芯片410。The sending module 212 in the client device 210 in FIG. 5 may be equivalent to the radio frequency (RF) module 416 in the terminal device; the constituent module 211 of the client device 210 may be equivalent to the baseband chip 410 in the terminal device.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、存储盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态存储盘Solid State Disk(SSD))等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, DSL) or wireless (eg, infrared, wireless, microwave, etc.) means. The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a storage disk, a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk (SSD)).

Claims (18)

1.一种数据安全策略配置方法,其特征在于,应用于服务装置,包括:1. A data security policy configuration method, characterized in that it is applied to a service device, comprising: 接收客户装置发送的数据安全策略以及客户端数据的指示信息,其中,所述数据安全策略是所述客户装置根据所述客户端数据的属性从所述服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成的,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;Receive the data security policy and the instruction information of the client data sent by the client device, wherein the data security policy is that the client device selects one from the data security capability set provided by the service device according to the attributes of the client data Or multiple data security capabilities, the client data is stored on the side of the service device and related to the client device, and the data security capabilities in the data security capability set are the data security capabilities of the service device The ability to process data based on data security; 基于所述指示信息将所述数据安全策略应用于所述客户端数据中。Applying the data security policy to the client data based on the indication information. 2.根据权利要求1所述的方法,其特征在于,所述接收客户装置发送的数据安全策略以及客户端数据的指示信息,包括:2. The method according to claim 1, wherein the receiving the data security policy and the indication information of the client data sent by the client device comprises: 通过数据模型对应的网络传输方式接收客户装置发送的数据安全策略以及客户端数据的指示信息,其中,所述数据安全策略承载于所述数据模型中。The data security policy and the instruction information of the client device sent by the client device are received through the network transmission mode corresponding to the data model, wherein the data security policy is carried in the data model. 3.根据权利要求2所述的方法,其特征在于,所述数据模型为YANG模型,所述网络传输方式为网络配置协议NETCONF。3. The method according to claim 2, wherein the data model is a YANG model, and the network transmission mode is a network configuration protocol NETCONF. 4.根据权利要求2所述的方法,其特征在于,所述数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口。4. The method according to claim 2, wherein the data model is a structured data serialization file, and the network transmission mode is a remote procedure call (RPC) interface. 5.根据权利要求1至4任一权利要求所述的方法,其特征在于,所述方法还包括:5. The method according to any one of claims 1 to 4, wherein the method further comprises: 接收客户装置发送的操作指示信息;Receive operation instruction information sent by the client device; 基于所述操作指示信息对所述数据安全策略进行维护操作,其中,所述维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。Perform a maintenance operation on the data security policy based on the operation instruction information, wherein the maintenance operation includes one or more of querying the data security policy, deleting the data security policy, and modifying the data security policy. 6.根据权利要求1至5任一权利要求所述的方法,其特征在于,数据安全能力集合包括敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力中的一种或者多种。6. The method according to any one of claims 1 to 5, wherein the set of data security capabilities includes one or more of sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities Various. 7.一种数据安全策略配置方法,其特征在于,应用于客户装置,包括:7. A data security policy configuration method, characterized in that it is applied to a client device, comprising: 根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;Select one or more data security capabilities from the set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy. The client data is stored on the server side and shared with the client device. For related data, the data security capability in the data security capability set is the capability of the service device to process data based on data security; 向所述服务装置发送所述数据安全策略。Send the data security policy to the service device. 8.根据权利要求7所述的方法,其特征在于,8. The method of claim 7, wherein, 通过数据模型对应的网络传输方式将所述数据安全策略发送给所述服务装置,其中,所述数据安全策略承载于所述数据模型中。The data security policy is sent to the service device through a network transmission manner corresponding to the data model, wherein the data security policy is carried in the data model. 9.根据权利要求8所述的方法,其特征在于,所述数据模型为YANG模型,所述网络传输方式为网络配置协议NETCONF。9. The method according to claim 8, wherein the data model is a YANG model, and the network transmission mode is a network configuration protocol NETCONF. 10.根据权利要求8所述的方法,其特征在于,所述数据模型为结构数据序列化文件,所述网络传输方式为远程过程调用RPC接口。10. The method according to claim 8, wherein the data model is a structured data serialization file, and the network transmission mode is a remote procedure call (RPC) interface. 11.根据权利要求7-10任一权利要求所述的方法,其特征在于,所述方法还包括:11. The method according to any one of claims 7-10, further comprising: 向所述服务装置发送操作指示信息,其中,所述操作指示信息用于指示对所述数据安全策略进行维护操作,所述维护操作包括查询数据安全策略、删除数据安全策略以及修改数据安全策略中的一种或者多个。Sending operation instruction information to the service device, wherein the operation instruction information is used to instruct to perform maintenance operations on the data security policy, and the maintenance operations include querying the data security policy, deleting the data security policy, and modifying the data security policy. one or more of. 12.根据权利要求7至11任一权利要求所述的方法,其特征在于,数据安全能力集合包括敏感信息安全能力、数据加密安全能力、存储模式安全能力以及数据释放安全能力中的一种或者多种。12. The method according to any one of claims 7 to 11, wherein the set of data security capabilities includes one or more of sensitive information security capabilities, data encryption security capabilities, storage mode security capabilities, and data release security capabilities Various. 13.根据权利要求7至12任一权利要求所述的方法,其特征在于,在根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略之前,所述方法还包括:13. The method according to any one of claims 7 to 12, wherein one or more data security capabilities are selected from the set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy Previously, the method further included: 接收所述服务装置发送的数据安全能力集合。Receive the data security capability set sent by the service device. 14.一种数据安全策略配置系统,其特征在于,包括客户装置以及服务装置,14. A data security policy configuration system, characterized in that it includes a client device and a server device, 所述客户装置用于根据客户端数据的属性从服务装置提供的数据安全能力集合中选择一个或者多个数据安全能力构成数据安全策略,所述客户端数据是被存储在所述服务装置侧、且与所述客户装置相关的数据,所述数据安全能力集合中的数据安全能力是所述服务装置基于数据安全进行数据处理的能力;The client device is used to select one or more data security capabilities from a set of data security capabilities provided by the service device according to the attributes of the client data to form a data security policy. The client data is stored on the side of the service device, And for the data related to the client device, the data security capability in the data security capability set is the capability of the service device to process data based on data security; 所述服务装置用于接收所述客户装置发送的数据安全策略以及客户端数据的指示信息,The service device is configured to receive the data security policy and the instruction information of the client data sent by the client device, 所述服务装置还用于基于所述指示信息将所述数据安全策略应用于所述客户端数据中。The service device is further configured to apply the data security policy to the client data based on the indication information. 15.根据权利要求14所述的系统,其特征在于,15. The system of claim 14, wherein: 所述客户装置还用于接收所述服务装置发送的数据安全能力集合。The client device is further configured to receive the data security capability set sent by the service device. 16.一种服务设备,其特征在于,包括:处理器以及存储器,其中,所述处理器执行所述存储器中的程序以运行计算服务和存储服务,从而执行如权利要求1至6任一权利要求所述的方法。16. A service device, characterized by comprising: a processor and a memory, wherein the processor executes the program in the memory to run computing services and storage services, thereby executing any one of claims 1 to 6 method as described. 17.一种终端设备,其特征在于,包括:处理器以及存储器,其中,所述处理器执行所述存储器中的程序,从而执行如权利要求7至13任一权利要求所述的方法。17. A terminal device, characterized by comprising: a processor and a memory, wherein the processor executes a program in the memory, so as to execute the method according to any one of claims 7 to 13. 18.一种计算机可读存储介质,其特征在于,包括指令,当所述指令在计算节点上运行时,使得所述计算节点执行如权利要求1至13任一权利要求所述的方法。18. A computer-readable storage medium, comprising instructions, which, when the instructions are run on a computing node, cause the computing node to execute the method according to any one of claims 1 to 13.
CN202111152460.2A 2021-09-29 2021-09-29 Data security policy configuration method, device and system Pending CN115879143A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111152460.2A CN115879143A (en) 2021-09-29 2021-09-29 Data security policy configuration method, device and system
PCT/CN2022/122075 WO2023051595A1 (en) 2021-09-29 2022-09-28 Data security policy configuration method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111152460.2A CN115879143A (en) 2021-09-29 2021-09-29 Data security policy configuration method, device and system

Publications (1)

Publication Number Publication Date
CN115879143A true CN115879143A (en) 2023-03-31

Family

ID=85756170

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111152460.2A Pending CN115879143A (en) 2021-09-29 2021-09-29 Data security policy configuration method, device and system

Country Status (2)

Country Link
CN (1) CN115879143A (en)
WO (1) WO2023051595A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854625B (en) * 2009-04-03 2014-12-03 华为技术有限公司 Selective processing method and device of security algorithm, network entity and communication system
CN103023682A (en) * 2011-09-26 2013-04-03 腾讯科技(深圳)有限公司 Security policy management method and device
CN105069362B (en) * 2015-06-30 2018-04-20 广东轩辕网络科技股份有限公司 A kind of storage method and device
US10182055B2 (en) * 2016-06-06 2019-01-15 Cisco Technology, Inc. Security policy efficacy visualization
US10412113B2 (en) * 2017-12-08 2019-09-10 Duo Security, Inc. Systems and methods for intelligently configuring computer security

Also Published As

Publication number Publication date
WO2023051595A1 (en) 2023-04-06

Similar Documents

Publication Publication Date Title
JP6426846B2 (en) System-on-chip with reconfigurable resources for multiple computer subsystems
US8782198B2 (en) System and method for storage discovery in a storage area network using device domains under control of a storage device
US9459897B2 (en) System and method for providing data analysis service in cloud environment
KR20160014043A (en) Efficient programmatic memory access over network file access protocols
CN112805980B (en) Techniques for mobile device management based on query-less device configuration determination
CN109992400A (en) Resource allocation method, device, mobile terminal, and computer-readable storage medium
KR20160008885A (en) Memory Managing Method and Electonic Device
US12079663B2 (en) Provisioning of physical servers through hardware composition
US11347413B2 (en) Opportunistic storage service
CN114817120A (en) Cross-domain data sharing method, system-on-chip, electronic device and medium
CN110032321B (en) Application processing method and device, electronic equipment, computer-readable storage medium
CN109992399B (en) Resource management method, device, mobile terminal, and computer-readable storage medium
CN107861691A (en) A kind of load-balancing method and device of more controlled storage systems
CN110018903A (en) Method for managing resource, device, mobile terminal and computer readable storage medium
CN109391508B (en) A computer-implemented method for automatically composing data center resources in a data center
CN109992369B (en) Application processing method and apparatus, electronic device, and computer-readable storage medium
CN109992309B (en) Application processing method and apparatus, electronic device, and computer-readable storage medium
US11314353B1 (en) System and method for transfer of clipboard data between display screens
US20250138839A1 (en) Managing user personas using a management controller
WO2023051595A1 (en) Data security policy configuration method, device and system
US20240249031A1 (en) System and method for managing use of storage in distributed systems
KR102493291B1 (en) User account aware personal area network bonding
WO2023116859A1 (en) Sensor device virtualization method and apparatus, electronic device and storage medium
US20220137816A1 (en) Native memory semantic remote memory access system
US20120110370A1 (en) Highly available file system in a directly attached storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20230331

WD01 Invention patent application deemed withdrawn after publication