Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data authorization method and system

A technology of data authorization and data request, applied in the direction of digital transmission system, transmission system, user identity/authority verification, etc., can solve the problem of lack of flexibility and efficiency, difficulty in adapting to a dynamic and changeable network environment, and difficulty in supporting flexibility and efficiency To improve flexibility and efficiency, support security sharing and value protection, and realize generalization

Active Publication Date: 2019-07-09
TSINGHUA UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing data authorization systems are independent of the network application, that is, the authorization logic of the existing data authorization system is limited to a specific network application, which leads to the need for cross-authorization and data sharing between different applications. Specifically, for example, the operating entities of different applications sign offline contracts, and complete cross-authorization and data sharing between different applications through layers of offline authorization.
[0005] The existing data authorization system obviously has the problem of not opening up the data authorization mechanisms of different data owners (such as different operating entities belonging to different network applications, etc.), lacks flexibility and efficiency, and is difficult to adapt to the dynamic and changeable network environment , it is difficult to support flexible and efficient data authorization requirements in a dynamic network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authorization method and system
  • Data authorization method and system
  • Data authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] refer to figure 1 , is a schematic flowchart of the data authorization method provided in Embodiment 1 of this application. In Embodiment 1, as figure 1 As shown, the data authorization method includes the following processing steps:

[0055] Step 101, obtain the data access request of the data requester; the data access request at least includes: the digital signature obtained by signing the original data access request message with the hardware digital identity information of the data requester and the data requester's The first blockchain address.

[0056] In practical applications, the data authorization processing logic of the method of this application can be implemented in the form of a software system. Specifically, refer to figure 2 As shown, a data authorization system based on the blockchain token system can be realized based on the method of this application.

[0057] Users who participate in the use of this system, such as data requesters who need to re...

Embodiment 2

[0082] refer to image 3 , is a schematic flowchart of the data authorization method provided in Embodiment 2 of the present application. In this embodiment, the data authorization method may further include the following steps:

[0083] Step 107. When there is a need to send the token information to the target user, send the token information to the target user online in a dynamic and real-time manner.

[0084] Among them, the system administrator can dynamically and real-time send token information (including the type and quantity of tokens) online to a target user according to actual needs, so as to temporarily grant a target user access to certain data. And specifically, the system administrator can also set the valid time limit information of the pass information sent online according to actual needs, for example, set the valid time limit of the sent pass information to 5 minutes, etc., so that, subsequently, the target user can be in this The sent pass is used for corre...

Embodiment 3

[0087] refer to Figure 4 , is a schematic flowchart of the data authorization method provided in Embodiment 3 of the present application. In this embodiment, the data authorization method may further include the following steps:

[0088] Step 108: Record the interaction information involved in the process of the interaction between the user and the blockchain, and store the interaction information on the blockchain.

[0089]Specifically, it may include but is not limited to recording in the blockchain the interaction information involved in various interactive operations such as the data owner registering with the blockchain, the data requester requesting access to data from the blockchain, and the sending of tokens. .

[0090] In this embodiment, by recording the interaction information involved in the process of interaction between the user and the blockchain in the blockchain, it can facilitate the traceability and auditing of subsequent data authorization behaviors.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data authorization method and system. According to the data authorization method and system, certificate passing information of multiple users and authorization conditions ofdifferent data owned by the multiple users are stored in a chain in advance based on a block chain technology; and data authority authentication is carried out on the data requester by utilizing the on-chain pass information and data authorization conditions of different data owners, so that a data authorization scheme based on the block chain pass system is realized. According to the invention, the blockchain pass system is designed; the consistency of data interaction authorities of various data owners (such as different operation entities to which different network applications belong) canbe opened based on the pass of the chain universally recognized consensus; generalization, standardization and flattening of data authorization mechanisms of different data owners are effectively achieved, so that flexibility and high efficiency of data authorization are improved, and safety sharing and value protection of data in a dynamic network space can be better supported.

Description

technical field [0001] The present application belongs to the technical field of data rights management, and in particular relates to a data authorization method and system. Background technique [0002] With the rapid development of information technologies such as big data, cloud computing, Internet of Things, and artificial intelligence, the scale of data in cyberspace has shown exponential growth. The value contained in the data itself and its supporting role for the above-mentioned technologies make data more and more important. [0003] Under the above environment, at present, data has become the latest economic resource, and data capitalization has become the consensus of the information age. As an effective asset in the future information society, its circulation value is increasingly apparent, and the role of the data authorization system in the data circulation process is very critical. Based on the data authorization system, it can effectively ensure that data ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0876H04L63/102H04L9/3247H04L63/105H04L9/50
Inventor 尹浩王凯董加卿
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products