Trusted data authorization method, certificate authorization method and service access method

A data authorization and trusted technology, applied in the field of data security interaction, can solve problems such as data sharing difficulties, irregular use of user data, and difficulties in business data collaboration

Active Publication Date: 2021-02-02
大汉软件股份有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of service development, user data is misused and abused, lacking unified process control and centralized authorization management;
[0005] (2) There is leakage in data interaction
During the data interaction process, the use of user data is not standardized, the interaction process is not safe, lack of user awareness and active authorization awareness, and it is easy to cause data leakage;
[0006] (3) Difficulty in synergy of business data
In the process of business collaboration, the data is scattered in the systems of various business units, the willingness of each unit to connect is inconsistent, data sharing is difficult, and there is a lack of a safe and reliable docking mode;
[0007] (4) Application records are not traceable
During the interactive use of user data, the integrity of application records is low, and there is no tamper-proof and traceable trusted storage area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted data authorization method, certificate authorization method and service access method
  • Trusted data authorization method, certificate authorization method and service access method
  • Trusted data authorization method, certificate authorization method and service access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the embodiments and accompanying drawings.

[0049] The trusted data authorization method based on blockchain in this embodiment utilizes the technical characteristics of blockchain such as non-tamperable, traceable, privacy protection, and distributed fault tolerance, and builds a trusted data authorization platform around the technical concept of overall planning, openness, and control. , Establish a standard on-chain process to realize perceivable authorization behaviors, identifiable authorization risks, and traceable authorization records.

[0050] Such as figure 1 As shown, a trusted data authorization method includes the following steps: when the business initiates user information authorization, the authorization information is transformed into ciphertext through the trusted data authorization platform; If the risk is ju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trusted data authorization method, which comprises the following steps of: when a service initiating user uses authorization, sending a service code and an institution acceskey to a trusted data authorization platform, and returning a verification result of an institution authorization initiating authority and whether the authorization needs to be initiated or not; when authorization needs to be initiated, the service performs ciphertext conversion on the authorization information to obtain an authorization data ciphertext; performing risk judgment on the authorization behavior, and completing authorization confirmation after the risk judgment is passed; establishing a block node for each service on the trusted data authorization platform, and storing the authorization data ciphertext into the block node to form distributed deployment; generating a unique authorization record HASH value on a trusted data authorization platform, storing the HASH value into a service cache, and establishing a unique index; and when the authorization information needs to be used, the service obtains the authorization data ciphertext from the trusted data authorization platform and decrypts the authorization data ciphertext to obtain the authorization information. The invention also discloses a certificate authorization method and a service access method.

Description

technical field [0001] The invention belongs to the technical field of data security interaction, and relates to a trusted data authorization method, a clear certificate authorization method and a service access method. Background technique [0002] With the in-depth promotion of "Internet + government services", the level of national government services has entered a stage of rapid development, and the degree of data sharing is getting deeper and deeper. At the same time, it has also brought about the lack of effective control and security guarantees in the process of frequent use of user data The problem. [0003] Under the current authorized use technology of government service data, there are mainly the following problems: [0004] (1) The use process lacks control. In the process of service development, user data is misused and abused, lacking unified process control and centralized authorization management; [0005] (2) There is leakage in data interaction. During ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/176G06F16/13G06F21/31G06F21/62G06F21/64
CPCG06F21/31G06F21/6245G06F21/64G06F2221/2107G06F16/137G06F16/176
Inventor 王知明葛敏捷
Owner 大汉软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products