Data access method, access verification device and data storage system

A data storage system and data access technology, applied in the field of access verification equipment, data storage systems, and data access methods, can solve the problems of low data access efficiency, achieve the effect of improving data access efficiency and avoiding low data access efficiency

Active Publication Date: 2018-12-07
湖南岳麓山数据科学与技术研究院有限公司
View PDF11 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of this application is to provide a data access method, an access verification device and a data storage system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method, access verification device and data storage system
  • Data access method, access verification device and data storage system
  • Data access method, access verification device and data storage system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055] In order to realize data sharing, data is usually shared in a data storage system, and security is ensured by setting data access permissions. At present, the commonly used authority management scheme adopts a hierarchical authorization mechanism. The data sharing service between different entities needs to rely on the upper layer of the hierarchical authorization system to authenticate each other, and then send it to the level of the data requesting entity to complete the authorization. However, because entities of different levels (user's client) correspond to different data permissions, different data has different visibility to different entities, resulting in a massive mapping relationship between data and users (clients), and layer by layer after request The issuance of authorization results in low data sharing efficiency, and it is difficult to flexibly support multi-level sharing authority management.

[0056] In order to solve the above problems, the access verifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data access method, an access verification device and a data storage system. The data access method is applied to the access verification device, the access verification device has a preset license chain, permissions are respectively set for data and a user on the license chain, and the permissions are characterized by the type and number of tokens. The method comprises the following steps: querying the access permission of the user on the preset license chain in response to a data access request sent by the user through a client, wherein the access permission is characterized by the type and number of tokens; generating data access information based on the type and number of tokens in the access permission; and sending the data access information to the client, so that the client accesses the data in the data storage system based on the data access information.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a data access method, access verification equipment and a data storage system. Background technique [0002] In existing data sharing services, a hierarchical authority management system is usually adopted. For example, after the upper layers that require hierarchical authorization are mutually authenticated, they are then sent down to the layer where the data requesting client is located to complete the authorization. [0003] Therefore, in the above permission management, different levels of clients correspond to different data permissions, and different data have different visibility to different clients, resulting in the formation of a massive mapping relationship between data and clients, and then layer after layer of requests. Authorization, resulting in low efficiency of data access. Contents of the invention [0004] In view of this, the purpose of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/10H04L63/105H04L67/1097
Inventor 尹浩董加卿
Owner 湖南岳麓山数据科学与技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products