Secure data processing method and system
First Claim
1. A method for improving an enterprise intranet of a private cloud system, comprising:
- identifying at least one terminal among a plurality of terminals in the enterprise intranet as at least one trustworthy machine according to a predetermined rule, wherein the predetermined rule pre-sets the level of the at least one terminal as trustworthy;
storing identification information of the at least one trustworthy machine in a server, wherein the server performs security control over the enterprise intranet based at least in part on the stored identification information;
receiving, from a first terminal among the plurality of terminals in the enterprise intranet, an upload request for adding a file feature into a security database in the enterprise intranet, wherein the request includes an identification code of the first terminal, a directory path of a file in the first terminal, and the file feature, and the file feature is identification data for identifying the file;
determining whether the first terminal is a trustworthy machine by comparing the identification code of the first terminal to the identification information of the at least one trustworthy machine stored in the server;
adding the file feature into the security database in the enterprise intranet in response to the determination that the identification code of the first terminal matches identification information of one of the at least one trustworthy machine; and
determining whether file feature information uploaded by a second terminal among the plurality of terminals in the enterprise intranet is secure based on the file feature added in the security database in the enterprise intranet by the first terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention discloses a secure data processing method and system, wherein the secure data processing method comprises the following steps of: a security control server receiving a data upload request from a terminal, and obtaining a file feature, an identification code of the terminal and a directory path of a file with the file feature in the terminal comprised in the data upload request; the security control server judging whether the terminal is a trustable machine and/or judging whether the directory path is a credit directory according to the identification code and/or the directory path, and if the terminal is a trustable machine and/or the directory path is a credit directory, adding the uploaded file feature into a security database, or otherwise, not adding it into the security database; the trustable machine is a terminal in which data is considered as secure data. The invention further provides a secure data processing system implementing the foregoing method. The secure data processing method and system can improve the update efficiency of the secure data.
9 Citations
12 Claims
-
1. A method for improving an enterprise intranet of a private cloud system, comprising:
-
identifying at least one terminal among a plurality of terminals in the enterprise intranet as at least one trustworthy machine according to a predetermined rule, wherein the predetermined rule pre-sets the level of the at least one terminal as trustworthy; storing identification information of the at least one trustworthy machine in a server, wherein the server performs security control over the enterprise intranet based at least in part on the stored identification information; receiving, from a first terminal among the plurality of terminals in the enterprise intranet, an upload request for adding a file feature into a security database in the enterprise intranet, wherein the request includes an identification code of the first terminal, a directory path of a file in the first terminal, and the file feature, and the file feature is identification data for identifying the file; determining whether the first terminal is a trustworthy machine by comparing the identification code of the first terminal to the identification information of the at least one trustworthy machine stored in the server; adding the file feature into the security database in the enterprise intranet in response to the determination that the identification code of the first terminal matches identification information of one of the at least one trustworthy machine; and determining whether file feature information uploaded by a second terminal among the plurality of terminals in the enterprise intranet is secure based on the file feature added in the security database in the enterprise intranet by the first terminal. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for improving an enterprise intranet of a private cloud system:
-
a processor; and a memory communicatively coupled to the processor and storing instructions that upon execution by the processor cause the system to; identify at least one terminal among a plurality of terminals in the enterprise intranet as at least one trustworthy machine according to a predetermined rule, wherein the predetermined rule pre-sets the level of the at least one terminal as trustworthy; store identification information of the at least one trustworthy machine in a server, wherein the server performs security control over the enterprise intranet based at least in part on the stored identification information; receive, from a first terminal among the plurality of terminals in the enterprise intranet, an upload request for adding a file feature into a security database in the enterprise intranet, wherein the request includes an identification code of the first terminal, a directory path of a file in the first terminal, and the file feature, and the file feature is identification data for identifying the file; determine whether the first terminal is a trustworthy machine by comparing the identification code of the first terminal to the identification information of the at least one trustworthy machine stored in the server; add the file feature into the security database in the enterprise intranet in response to the determination that the identification code of the first terminal matches identification information of one of the at least one trustworthy machine; and determine whether file feature information uploaded by a second terminal among the plurality of terminals in the enterprise intranet is secure based on the file feature added in the security database in the enterprise intranet by the first terminal. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium having instructions that upon execution on a computing device cause the computing device at least to:
-
identify at least one terminal among a plurality of terminals an enterprise intranet of a private cloud system as at least one trustworthy machine according to a predetermined rule, wherein the predetermined rule pre-sets the level of the at least one terminal as trustworthy; store identification information of the at least one trustworthy machine in a server, wherein the server performs security control over the enterprise intranet based at least in part on the stored identification information; receive, from a first terminal among the plurality of terminals in the enterprise intranet, an upload request for adding a file feature into a security database in the enterprise intranet, wherein the request includes an identification code of the first terminal, a directory path of a file in the first terminal, and the file feature, and the file feature is identification data for identifying the file; determine whether the first terminal is a trustworthy machine by comparing the identification code of the first terminal to the identification information of the at least one trustworthy machine stored in the server; add the file feature into the security database in the enterprise intranet in response to the determination that the identification code of the first terminal matches identification information of one of the at least one trustworthy machine; and determine whether file feature information uploaded by a second terminal among the plurality of terminals in the enterprise intranet is secure based on the file feature added in the security database in the enterprise intranet by the first terminal. - View Dependent Claims (12)
-
Specification