Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A trusted data authorization method, a proof certificate authorization method, and a service access method

A data authorization and credible technology, applied in the field of data security interaction, can solve the problems of low retention integrity of application records, inconsistent willingness to connect units, and difficulty in data sharing, so as to achieve the effect of traceable authorization records and identifiable authorization risks.

Active Publication Date: 2021-05-04
大汉软件股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of service development, user data is misused and abused, lacking unified process control and centralized authorization management;
[0005] (2) There is leakage in data interaction
During the data interaction process, the use of user data is not standardized, the interaction process is not safe, lack of user awareness and active authorization awareness, and it is easy to cause data leakage;
[0006] (3) Difficulty in synergy of business data
In the process of business collaboration, the data is scattered in the systems of various business units, the willingness of each unit to connect is inconsistent, data sharing is difficult, and there is a lack of a safe and reliable docking mode;
[0007] (4) Application records are not traceable
During the interactive use of user data, the integrity of application records is low, and there is no tamper-proof and traceable trusted storage area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted data authorization method, a proof certificate authorization method, and a service access method
  • A trusted data authorization method, a proof certificate authorization method, and a service access method
  • A trusted data authorization method, a proof certificate authorization method, and a service access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the embodiments and accompanying drawings.

[0049] The trusted data authorization method based on blockchain in this embodiment utilizes the technical characteristics of blockchain such as non-tamperable, traceable, privacy protection, and distributed fault tolerance, and builds a trusted data authorization platform around the technical concept of overall planning, openness, and control. , Establish a standard on-chain process to realize perceivable authorization behaviors, identifiable authorization risks, and traceable authorization records.

[0050] like figure 1 As shown, a trusted data authorization method includes the following steps: when the business initiates user information authorization, the authorization information is transformed into ciphertext through the trusted data authorization platform; If the risk is judge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credible data authorization method, which comprises the following steps: when a service is initiated to authorize the use of user information, send a service code and an organization accesskey to a trusted data authorization platform, return the verification result of the organization's authorization initiation authority, and whether it is necessary to initiate Authorization; when authorization needs to be initiated, the business converts the authorization information into ciphertext to obtain the authorization data ciphertext; conducts risk judgment on the authorization behavior, and completes authorization confirmation after passing the risk judgment; The block node stores the authorized data ciphertext in the block node to form a distributed deployment; and generates a unique authorization record HASH value on the trusted data authorization platform, stores the HASH value in the service cache, and establishes a unique index; when needed, use Authorization information, the business obtains the authorized data ciphertext from the trusted data authorization platform, and the business decrypts it to obtain the authorization information. The invention also discloses a certificate authorization method and a service access method.

Description

technical field [0001] The invention belongs to the technical field of data security interaction, and relates to a trusted data authorization method, a clear certificate authorization method and a service access method. Background technique [0002] With the in-depth promotion of "Internet + government services", the level of national government services has entered a stage of rapid development, and the degree of data sharing is getting deeper and deeper. At the same time, it has also brought about the lack of effective control and security guarantees in the process of frequent use of user data The problem. [0003] Under the current authorized use technology of government service data, there are mainly the following problems: [0004] (1) The use process lacks control. In the process of service development, user data is misused and abused, lacking unified process control and centralized authorization management; [0005] (2) There is leakage in data interaction. During ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/176G06F16/13G06F21/31G06F21/62G06F21/64
CPCG06F21/31G06F21/6245G06F21/64G06F2221/2107G06F16/137G06F16/176
Inventor 王知明葛敏捷
Owner 大汉软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products