Unlock instant, AI-driven research and patent intelligence for your innovation.

A data authorization method and system

A technology of data authorization and data request, applied in digital transmission system, transmission system, user identity/authority verification, etc., can solve the problem of difficult to support flexible and efficient data authorization requirements, difficult to adapt to dynamic and changeable network environment, lack of flexibility issues such as security and efficiency, to achieve the effect of supporting security sharing and value protection, improving flexibility and efficiency, and realizing generalization

Active Publication Date: 2020-11-03
TSINGHUA UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing data authorization systems are independent of the network application, that is, the authorization logic of the existing data authorization system is limited to a specific network application, which leads to the need for cross-authorization and data sharing between different applications. Specifically, for example, the operating entities of different applications sign offline contracts, and complete cross-authorization and data sharing between different applications through layers of offline authorization.
[0005] The existing data authorization system obviously has the problem of not opening up the data authorization mechanisms of different data owners (such as different operating entities belonging to different network applications, etc.), lacks flexibility and efficiency, and is difficult to adapt to the dynamic and changeable network environment , it is difficult to support flexible and efficient data authorization requirements in a dynamic network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data authorization method and system
  • A data authorization method and system
  • A data authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] refer to figure 1 , is a schematic flowchart of the data authorization method provided in Embodiment 1 of this application. In Embodiment 1, as figure 1 As shown, the data authorization method includes the following processing steps:

[0055] Step 101, obtain the data access request of the data requester; the data access request at least includes: the digital signature obtained by signing the original data access request message with the hardware digital identity information of the data requester and the data requester's The first blockchain address.

[0056] In practical applications, the data authorization processing logic of the method of this application can be implemented in the form of a software system. Specifically, refer to figure 2 As shown, a data authorization system based on the blockchain token system can be realized based on the method of this application.

[0057] Users who participate in the use of this system, such as data requesters who need to re...

Embodiment 2

[0082] refer to image 3 , is a schematic flowchart of the data authorization method provided in Embodiment 2 of the present application. In this embodiment, the data authorization method may further include the following steps:

[0083] Step 107. When there is a need to send the token information to the target user, send the token information to the target user online in a dynamic and real-time manner.

[0084] Among them, the system administrator can dynamically and real-time send token information (including the type and quantity of tokens) online to a target user according to actual needs, so as to temporarily grant a target user access to certain data. And specifically, the system administrator can also set the valid time limit information of the pass information sent online according to actual needs, for example, set the valid time limit of the sent pass information to 5 minutes, etc., so that, subsequently, the target user can be in this The sent pass is used for corre...

Embodiment 3

[0087] refer to Figure 4 , is a schematic flowchart of the data authorization method provided in Embodiment 3 of the present application. In this embodiment, the data authorization method may further include the following steps:

[0088] Step 108: Record the interaction information involved in the process of the interaction between the user and the blockchain, and store the interaction information on the blockchain.

[0089]Specifically, it may include but is not limited to recording in the blockchain the interaction information involved in various interactive operations such as the data owner registering with the blockchain, the data requester requesting access to data from the blockchain, and the sending of tokens. .

[0090] In this embodiment, by recording the interaction information involved in the process of interaction between the user and the blockchain in the blockchain, it can facilitate the traceability and auditing of subsequent data authorization behaviors.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a data authorization method and system. The data authorization method and system store the certificate information of multiple users and the authorization conditions of different data owned by multiple users on the chain in advance based on block chain technology, and then use The certificate information on the chain and the data authorization conditions of different data owners authenticate the data authority of the data requester, realizing a data authorization scheme based on the blockchain certificate system. Through the design of the blockchain token system, this application can open up the consistency of data interaction permissions of various data owners (such as different operating entities belonging to different network applications) based on the generally recognized consensus on the chain, effectively realizing the consistency of different data The generalization, standardization, and flattening of the owner's data authorization mechanism have improved the flexibility and efficiency of data authorization, and can better support the safe sharing and value protection of data in dynamic cyberspace.

Description

technical field [0001] The present application belongs to the technical field of data rights management, and in particular relates to a data authorization method and system. Background technique [0002] With the rapid development of information technologies such as big data, cloud computing, Internet of Things, and artificial intelligence, the scale of data in cyberspace has shown exponential growth. The value contained in the data itself and its supporting role for the above-mentioned technologies make data more and more important. [0003] Under the above environment, at present, data has become the latest economic resource, and data capitalization has become the consensus of the information age. As an effective asset in the future information society, its circulation value is increasingly apparent, and the role of the data authorization system in the data circulation process is very critical. Based on the data authorization system, it can effectively ensure that data ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0876H04L63/102H04L9/3247H04L63/105H04L9/50
Inventor 尹浩王凯董加卿
Owner TSINGHUA UNIV