User data access control method, device and system

A data access and user data technology, applied in the Internet field, can solve problems such as poor data security of data sources and poor account security.

Active Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present application provides a user data access control method, device and system, to at least solve the problem of data source access due to the poor security of the account that initiates the access when the user uses a third-party system to access the data source in the prior art. Technical issues with poor data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User data access control method, device and system
  • User data access control method, device and system
  • User data access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to the embodiment of the present application, a method embodiment of a user data access control method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a computer terminal according to a user data access control method according to an embodiment of the present application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is sh...

Embodiment 2

[0178] According to the embodiment of the present application, a method embodiment of a user data access control method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0179] The method embodiment provided in Embodiment 2 of the present application can still be executed in a mobile terminal, a computer terminal or a similar computing device. It should be noted here that the method embodiment provided in Embodiment 2 can still run on figure 1 on the computer terminal shown.

[0180] Based on the above operating environment, this application can also provide such Figure 7 Access control methods for user data shown. Figure 7 It is a schematic flowchart of...

Embodiment 3

[0228] According to the embodiment of the present application, a method embodiment of a user data access control method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0229] The method embodiment provided in Embodiment 3 of the present application can still be executed in a mobile terminal, a computer terminal or a similar computing device. It should be noted here that the method embodiment provided in Embodiment 3 can still run on figure 1 on the computer terminal shown.

[0230] Based on the above operating environment, this application can also provide such Figure 8 Access control methods for user data shown. Figure 8 It is a schematic flowchart of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user data access control method, device and system. The user data access control method comprises: a first server receives a data access request initiated by an account; the first server verifies whether the data access request carries contextual information of the account, and / or performs verification on the contextual information of the account; under conditions that the first server determines the data access request comprises contextual information of the account and that the contextual information of the account passes the verification, the data access request is allowed to be transmitted to a third party system, so that the third party system access a data source according to the data access request. The user data access control method, device and system solve a problem that: during a process where a user uses the third party system to access the data source, the safety of the data of the data source is poor because the safety of the account which initiates the access is poor.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a user data access control method, device and system. Background technique [0002] In order to provide better services to users, existing service providers (such as Taobao, Tmall, etc.) need a large number of ISVs to jointly serve users. In this case, the service provider stores a large amount of open user data in the data source server by establishing an open data platform, and the user can authorize a third-party system to access the user data stored in the data source server. A solution to open a large amount of user data to the system provided by the ISV realizes a data open application environment. [0003] In the above-mentioned open data application environment, since the security of access users cannot be guaranteed, for example, hackers forge legitimate user accounts, so that forged accounts can replace legitimate users to use third-party systems to access data sour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/62
CPCG06F21/6272H04L63/10H04L67/63H04L9/40
Inventor 赵坤
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products