Permission management method and device

A technology of rights management and access rights, which is applied in the field of communication, can solve problems such as being attacked or tampered with, and achieve the effect of reducing the risk of being attacked or tampered with

Inactive Publication Date: 2019-06-14
北京融链科技有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a rights management method and device to at least solve the problem in the related art that the rights to access special files managed by the central server are attacked or tampered with randomly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission management method and device
  • Permission management method and device
  • Permission management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055]The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal of a rights management method according to an embodiment of the present invention, such as figure 1 As shown, the mobile terminal 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data. Optionally, the above-mentioned mobile terminal also A transmission device 106 for communication functions as well as input and output devices 108 may be included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and does not limit the str...

Embodiment 2

[0078] This embodiment also provides a device for rights management, which is used to implement the above embodiments and preferred implementation modes, and what has been described will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0079] image 3 is a block diagram of a rights management device according to an embodiment of the present invention, such as image 3 shown, including:

[0080] The first receiving module 32 is configured to receive a first access request message for a first user to access a ciphertext through a blockchain node, wherein the ciphertext is uploaded to the blockchain node by a second user;

[0081] A first judging module 34, configured to judge w...

Embodiment 3

[0099] An embodiment of the present invention also provides a storage medium, in which a computer program is stored, wherein the computer program is set to execute the steps in any one of the above method embodiments when running.

[0100] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0101] S11, receiving a first access request message for a first user to access a ciphertext through a blockchain node, wherein the ciphertext is uploaded to the blockchain node by a second user;

[0102] S12. Determine whether the first user has legal access authority according to the first access request message;

[0103] S13. If the judgment result is yes, provide the first user with a key of the authorization information of the ciphertext, where the key is used to instruct the first user to decrypt the ciphertext.

[0104] Optionally, in this embodiment, the above-mentioned storage medium...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a permission management method and device, and the method comprises the steps: receiving a first access request message of a first user for accessing a ciphertext through a blockchain node, the ciphertext being uploaded to the blockchain node by a second user; judging whether the first user has legal access authority or not according to the first access request message; if the judgment result is yes, executing the step 2; and providing a secret key of the authorization information of the ciphertext to the first user, wherein the secret key is used for indicating the first user to decrypt the ciphertext, so that the problem that in the prior art, the authority of managing and accessing the special file through the central server is attacked or tampered by any person can be solved, the access authority is managed through the block chain, and the risk of being attacked or tampered is reduced.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a rights management method and device. Background technique [0002] In the related technology, access rights management includes the following steps: setting the open rights of each content in the user information, and recording it in the content attribute of the user information recording module; setting the access rights type for the personnel in the personnel information recording module, and Record the type in the personnel attribute in the personnel information recording module; when the personnel in the personnel information recording module initiates an access request to the user, the access request is received, and the access request includes the content of the request for access; according to the access request The open permission of the content included in the request for access and the type of access permission of the person to respond; when it is necess...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王昕辰胡锴卢俊
Owner 北京融链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products