Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data reading method and device, data authorization method and device and storage medium

A data reading and data technology, applied in the field of blockchain, can solve problems such as poor results

Pending Publication Date: 2021-01-05
BEIJING XIAOMI PAYMENT TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since most of the data is stored after being encrypted, the corresponding key is required to access the data when reading. However, the current authorization method for encrypted data is limited, and only a specific private key can be used to access the data. Can access authorized data, which makes the actual application effect not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data reading method and device, data authorization method and device and storage medium
  • Data reading method and device, data authorization method and device and storage medium
  • Data reading method and device, data authorization method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the embodiments of the present disclosure. Rather, they are merely examples of apparatus consistent with aspects of the disclosed embodiments as recited in the appended claims.

[0100] An embodiment of the present disclosure provides a data reading method, figure 1 is a flow chart of a data reading method shown according to an exemplary embodiment, such as figure 1 As shown, the data reading method includes the following steps:

[0101] Step 101, receiving the identity identifier sent by the client and the read request for accessing the target dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data reading method and device, a data authorization method and device and a storage medium. The data reading method comprises the steps of receiving an identity identifiersent by a client and a reading request for requesting to access target data on a blockchain; determining whether the identity identifier is a member identifier belonging to a legal institution authorized to access the target data; and if the identity identifier is a member identifier belonging to a legal institution authorized to access the target data, obtaining decrypted target data based on anencryption key obtained from a blockchain and ciphertext data generated by encrypting the target data based on the encryption key. Therefore, as long as the reading request of the member identifier ofthe legal mechanism with authorized access can be responded, the data reading is more convenient and reasonable.

Description

technical field [0001] The present disclosure relates to the technical field of blockchain, and in particular, to a data reading method and device, a data authorization method and device, and a storage medium. Background technique [0002] In the supply chain business, operations such as writing, querying, or deleting are performed on business data. These operations on data involve the data authorizer and the data reader who wants to query the data. When the data reader wants to execute the query, it needs the authorization of the data authorizer. After the authorization, the data reader can complete the reading of the data. Since most of the data is stored after being encrypted, the corresponding key is required to access the data when reading. However, the current authorization method for encrypted data is limited, and only a specific private key can be used to access the data. Authorized data can be accessed, making it less effective in practical applications. Contents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/31
CPCG06F21/6218G06F21/602G06F21/31
Inventor 朱建伟
Owner BEIJING XIAOMI PAYMENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products