Supercharge Your Innovation With Domain-Expert AI Agents!

User authorization multi-party monitoring sharing method and system

A user authorization and sharing system technology, applied in the computer field, can solve the problems of inconvenient query monitoring, the query subject and the authorized subject have not been effectively verified, and the data transfer cannot be effectively monitored, etc., to achieve the effect of convenient supervision.

Active Publication Date: 2018-07-13
同创洪兴(苏州)生物科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) In terms of information verification, neither the inquiring subject nor the authorizing subject has been effectively verified;
[0005] (3) With regard to monitoring and transfer, data transfer cannot be effectively monitored;
[0006] (4) With regard to authorized storage, currently all authorizations are paper-based, and it is inconvenient to query and monitor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authorization multi-party monitoring sharing method and system
  • User authorization multi-party monitoring sharing method and system
  • User authorization multi-party monitoring sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] figure 1 It is a schematic flow diagram of the user authorization multi-party monitoring and sharing method in Embodiment 1 of the present invention, as shown in figure 1 As shown, the user authorizes multi-party monitoring and sharing methods including:

[0049] In step S101, the data usage platform and the data source platform are filed on the intermediate platform.

[0050] The filing information includes: data usage authorization agreement information, and identity information of the data usage platform and the data source platform.

[0051] The data usage authorization agreement is formulated on the data source side, and the end user must read and agree to it when using it. The data source provider may formulate an authorization agreement for all data services provided, and may also formulate an authorization agreement for each function or API (Application Program Interface, Application Program Interface) in the data service. A data source can have multiple auth...

Embodiment 2

[0067] figure 2 It is a schematic flow diagram of the user authorization multi-party monitoring and sharing method in Embodiment 1 of the present invention, as shown in figure 2 As shown, the user authorizes multi-party monitoring and sharing methods including:

[0068] In step S201, the data usage platform and the data source platform are filed on the intermediate platform.

[0069] The filing information recorded by the intermediate platform includes: data usage authorization agreement information, and identity information of the data usage platform and the data source platform.

[0070] Step S202, the intermediate platform returns authorization information to the data usage platform.

[0071] For example, if an e-commerce company wants to use the personal portrait query service of the Jinlian database, the e-commerce company first sends an authorization filing request to the intermediate platform through the data usage platform, and the intermediate platform queries the...

Embodiment 3

[0082] image 3 It is a schematic structural diagram of a user-authorized multi-party monitoring and sharing system in Embodiment 3 of the present invention, as shown in image 3 As shown, the user-authorized multi-party monitoring and sharing system 30 in Embodiment 3 of the present invention includes: a data usage platform 31 , an intermediate platform 32 and a data source platform 33 .

[0083] The intermediate platform 32 is used for filing with the data usage platform 31 and the data source platform 33 , and returns authorization information to the data usage platform 31 . The filing information recorded by the intermediate platform includes: data usage authorization agreement information, and identity information of the data usage platform and the data source platform.

[0084] The data usage platform 31 is configured to send a data usage request to the data source platform 33 .

[0085] The data source platform 33 is configured to return data to the data usage platfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authorization multi-party monitoring sharing method and system. The method comprises the following steps: a data usage platform and a data source platform put on recordson an intermediate platform; the intermediate platform returns authorization information to the data usage platform; the data usage platform sends a data usage request to the data source platform; andthe data source platform returns data to the data usage platform according to the data usage request. By adoption of the user authorization multi-party monitoring sharing method and system provided by the invention, various data use parties put on records on a unified platform, which is convenient for the supervision.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a user-authorized multi-party monitoring and sharing method and system. Background technique [0002] With the promulgation of the "Network Security Law" and the "Two High Judicial Interpretations", the requirements for the standardized use of data are becoming more and more stringent. Relevant regulations require that when using data, the authorization of individual users must be obtained, and the data source needs to provide personal authorization certificates for data use. The current commercial use of data has the following problems: [0003] (1) With regard to authorized spot checks, at present, the method of post-event spot checks on authorization templates is adopted to solve the authorization of data queries; [0004] (2) In terms of information verification, neither the inquiring subject nor the authorizing subject has been effectively verified; [0005] (3) With re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/0884H04L63/10H04L63/102H04L63/30
Inventor 龙凯刘屹洲赵相龙高瑞鑫
Owner 同创洪兴(苏州)生物科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More